================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff888116e4c468 of 8 bytes by interrupt on cpu 1: can_receive+0x62/0x1f0 net/can/af_can.c:651 canfd_rcv+0xe7/0x180 net/can/af_can.c:703 __netif_receive_skb_one_core net/core/dev.c:5899 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:6012 process_backlog+0x22e/0x440 net/core/dev.c:6360 __napi_poll+0x63/0x3c0 net/core/dev.c:7194 napi_poll net/core/dev.c:7263 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7385 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] batadv_nc_purge_paths+0x220/0x270 net/batman-adv/network-coding.c:471 batadv_nc_worker+0x3db/0xad0 net/batman-adv/network-coding.c:720 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x4db/0xa20 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888116e4c468 of 8 bytes by interrupt on cpu 0: can_receive+0x62/0x1f0 net/can/af_can.c:651 canfd_rcv+0xe7/0x180 net/can/af_can.c:703 __netif_receive_skb_one_core net/core/dev.c:5899 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:6012 process_backlog+0x22e/0x440 net/core/dev.c:6360 __napi_poll+0x63/0x3c0 net/core/dev.c:7194 napi_poll net/core/dev.c:7263 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7385 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] lock_sock_nested+0x10f/0x140 net/core/sock.c:3652 lock_sock include/net/sock.h:1624 [inline] sockopt_lock_sock+0x42/0x50 net/core/sock.c:1133 do_ip_getsockopt+0xbf3/0x1270 net/ipv4/ip_sockglue.c:1703 ip_getsockopt+0x5c/0x170 net/ipv4/ip_sockglue.c:1765 tcp_getsockopt+0xaa/0xe0 net/ipv4/tcp.c:4690 sock_common_getsockopt+0x5b/0x70 net/core/sock.c:3810 do_sock_getsockopt+0x1ca/0x260 net/socket.c:2364 __sys_getsockopt net/socket.c:2393 [inline] __do_sys_getsockopt net/socket.c:2400 [inline] __se_sys_getsockopt net/socket.c:2397 [inline] __x64_sys_getsockopt+0x18c/0x200 net/socket.c:2397 x64_sys_call+0x1288/0x2dc0 arch/x86/include/generated/asm/syscalls_64.h:56 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x000000000000030f -> 0x0000000000000310 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 3296 Comm: syz-executor Not tainted 6.14.0-rc4-syzkaller-00073-g5394eea10651 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 ==================================================================