================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff8881209f13e8 of 8 bytes by interrupt on cpu 0: can_receive+0x62/0x1f0 net/can/af_can.c:650 canfd_rcv+0xe7/0x180 net/can/af_can.c:702 __netif_receive_skb_one_core net/core/dev.c:5452 [inline] __netif_receive_skb+0x90/0x1b0 net/core/dev.c:5566 process_backlog+0x21f/0x380 net/core/dev.c:5894 __napi_poll+0x60/0x3b0 net/core/dev.c:6460 napi_poll net/core/dev.c:6527 [inline] net_rx_action+0x32b/0x750 net/core/dev.c:6660 __do_softirq+0xc1/0x265 kernel/softirq.c:553 do_softirq+0x5e/0x90 kernel/softirq.c:454 __local_bh_enable_ip+0x64/0x70 kernel/softirq.c:381 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:823 [inline] nsim_dev_trap_report_work+0x4cf/0x5a0 drivers/net/netdevsim/dev.c:853 process_one_work+0x434/0x860 kernel/workqueue.c:2597 worker_thread+0x5f2/0xa10 kernel/workqueue.c:2748 kthread+0x1d7/0x210 kernel/kthread.c:389 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308 read-write to 0xffff8881209f13e8 of 8 bytes by interrupt on cpu 1: can_receive+0x62/0x1f0 net/can/af_can.c:650 canfd_rcv+0xe7/0x180 net/can/af_can.c:702 __netif_receive_skb_one_core net/core/dev.c:5452 [inline] __netif_receive_skb+0x90/0x1b0 net/core/dev.c:5566 process_backlog+0x21f/0x380 net/core/dev.c:5894 __napi_poll+0x60/0x3b0 net/core/dev.c:6460 napi_poll net/core/dev.c:6527 [inline] net_rx_action+0x32b/0x750 net/core/dev.c:6660 __do_softirq+0xc1/0x265 kernel/softirq.c:553 invoke_softirq kernel/softirq.c:427 [inline] __irq_exit_rcu kernel/softirq.c:632 [inline] irq_exit_rcu+0x3b/0x90 kernel/softirq.c:644 sysvec_apic_timer_interrupt+0x6d/0x80 arch/x86/kernel/apic/apic.c:1109 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:645 get_ctx kernel/kcsan/core.c:206 [inline] check_access kernel/kcsan/core.c:750 [inline] __tsan_read4+0xe1/0x180 kernel/kcsan/core.c:1024 smpboot_thread_fn+0x185/0x4a0 kernel/smpboot.c:140 kthread+0x1d7/0x210 kernel/kthread.c:389 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308 value changed: 0x0000000000002380 -> 0x0000000000002381 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 20 Comm: ksoftirqd/1 Not tainted 6.4.0-syzkaller-11478-gd528014517f2 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 ================================================================== ================================================================== BUG: KCSAN: data-race in can_send / can_send read-write to 0xffff8881209f1390 of 8 bytes by interrupt on cpu 0: can_send+0x55e/0x5d0 net/can/af_can.c:289 bcm_can_tx+0x314/0x410 net/can/bcm.c:302 bcm_tx_timeout_handler+0xdb/0x260 __run_hrtimer kernel/time/hrtimer.c:1688 [inline] __hrtimer_run_queues+0x217/0x700 kernel/time/hrtimer.c:1752 hrtimer_run_softirq+0xd6/0x120 kernel/time/hrtimer.c:1769 __do_softirq+0xc1/0x265 kernel/softirq.c:553 do_softirq+0x5e/0x90 kernel/softirq.c:454 __local_bh_enable_ip+0x64/0x70 kernel/softirq.c:381 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:823 [inline] nsim_dev_trap_report_work+0x4cf/0x5a0 drivers/net/netdevsim/dev.c:853 process_one_work+0x434/0x860 kernel/workqueue.c:2597 worker_thread+0x5f2/0xa10 kernel/workqueue.c:2748 kthread+0x1d7/0x210 kernel/kthread.c:389 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308 read-write to 0xffff8881209f1390 of 8 bytes by interrupt on cpu 1: can_send+0x55e/0x5d0 net/can/af_can.c:289 bcm_can_tx+0x314/0x410 net/can/bcm.c:302 bcm_tx_timeout_handler+0xdb/0x260 __run_hrtimer kernel/time/hrtimer.c:1688 [inline] __hrtimer_run_queues+0x217/0x700 kernel/time/hrtimer.c:1752 hrtimer_run_softirq+0xd6/0x120 kernel/time/hrtimer.c:1769 __do_softirq+0xc1/0x265 kernel/softirq.c:553 invoke_softirq kernel/softirq.c:427 [inline] __irq_exit_rcu kernel/softirq.c:632 [inline] irq_exit_rcu+0x3b/0x90 kernel/softirq.c:644 sysvec_apic_timer_interrupt+0x6d/0x80 arch/x86/kernel/apic/apic.c:1109 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:645 is_atomic kernel/kcsan/core.c:249 [inline] should_watch kernel/kcsan/core.c:277 [inline] check_access kernel/kcsan/core.c:752 [inline] __tsan_read8+0xe4/0x180 kernel/kcsan/core.c:1025 batadv_nc_purge_paths+0x6d/0x260 net/batman-adv/network-coding.c:439 batadv_nc_worker+0x402/0xac0 net/batman-adv/network-coding.c:722 process_one_work+0x434/0x860 kernel/workqueue.c:2597 worker_thread+0x5f2/0xa10 kernel/workqueue.c:2748 kthread+0x1d7/0x210 kernel/kthread.c:389 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308 value changed: 0x0000000000007618 -> 0x0000000000007619 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 32 Comm: kworker/u4:3 Not tainted 6.4.0-syzkaller-11478-gd528014517f2 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 Workqueue: bat_events batadv_nc_worker ==================================================================