================================================================== BUG: KCSAN: data-race in can_send / can_stat_update read to 0xffff888120f5ec10 of 8 bytes by interrupt on cpu 1: can_stat_update+0xe5/0x630 net/can/proc.c:139 call_timer_fn+0x5f/0x2f0 kernel/time/timer.c:1404 expire_timers kernel/time/timer.c:1449 [inline] __run_timers kernel/time/timer.c:1773 [inline] __run_timers kernel/time/timer.c:1740 [inline] run_timer_softirq+0xc0c/0xcd0 kernel/time/timer.c:1786 __do_softirq+0x115/0x33f kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0xbb/0xe0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0xe6/0x280 arch/x86/kernel/apic/apic.c:1137 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:829 arch_local_irq_restore arch/x86/include/asm/paravirt.h:752 [inline] kcsan_setup_watchpoint+0x1d4/0x460 kernel/kcsan/core.c:429 check_access kernel/kcsan/core.c:459 [inline] __tsan_read4+0xc6/0x100 kernel/kcsan/core.c:588 __tlb_remove_page_size+0x45/0x1d0 mm/mmu_gather.c:81 __tlb_remove_page include/asm-generic/tlb.h:414 [inline] zap_pte_range mm/memory.c:1083 [inline] zap_pmd_range mm/memory.c:1184 [inline] zap_pud_range mm/memory.c:1213 [inline] zap_p4d_range mm/memory.c:1234 [inline] unmap_page_range+0xb8e/0x1940 mm/memory.c:1255 unmap_single_vma+0x144/0x200 mm/memory.c:1300 unmap_vmas+0xda/0x1a0 mm/memory.c:1332 exit_mmap+0x13e/0x300 mm/mmap.c:3140 __mmput kernel/fork.c:1082 [inline] mmput+0xea/0x280 kernel/fork.c:1103 exit_mm kernel/exit.c:485 [inline] do_exit+0x4ac/0x18c0 kernel/exit.c:784 do_group_exit+0xb4/0x1c0 kernel/exit.c:895 get_signal+0x2a2/0x1320 kernel/signal.c:2734 do_signal+0x2f/0x6c0 arch/x86/kernel/signal.c:815 exit_to_usermode_loop+0x250/0x2c0 arch/x86/entry/common.c:160 prepare_exit_to_usermode arch/x86/entry/common.c:195 [inline] syscall_return_slowpath arch/x86/entry/common.c:278 [inline] do_syscall_64+0x384/0x3a0 arch/x86/entry/common.c:304 entry_SYSCALL_64_after_hwframe+0x44/0xa9 write to 0xffff888120f5ec10 of 8 bytes by interrupt on cpu 0: can_send+0x349/0x590 net/can/af_can.c:290 j1939_send_one+0x197/0x200 net/can/j1939/main.c:340 j1939_tp_tx_dat net/can/j1939/transport.c:615 [inline] j1939_session_tx_dat net/can/j1939/transport.c:791 [inline] j1939_xtp_txnext_transmiter net/can/j1939/transport.c:847 [inline] j1939_tp_txtimer+0x499/0x1230 net/can/j1939/transport.c:1095 __run_hrtimer kernel/time/hrtimer.c:1517 [inline] __hrtimer_run_queues+0x274/0x5f0 kernel/time/hrtimer.c:1579 hrtimer_run_softirq+0x10e/0x150 kernel/time/hrtimer.c:1596 __do_softirq+0x115/0x33f kernel/softirq.c:292 run_ksoftirqd+0x46/0x60 kernel/softirq.c:603 smpboot_thread_fn+0x37d/0x4a0 kernel/smpboot.c:165 kthread+0x1d4/0x200 drivers/block/aoe/aoecmd.c:1253 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:352 Reported by Kernel Concurrency Sanitizer on: CPU: 0 PID: 9 Comm: ksoftirqd/0 Not tainted 5.5.0-rc1-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ==================================================================