================================================================== BUG: KCSAN: data-race in __bpf_get_stackid / bcmp write to 0xffff88811a3d8870 of 144 bytes by task 3300 on cpu 0: __bpf_get_stackid+0x761/0x800 kernel/bpf/stackmap.c:288 ____bpf_get_stackid kernel/bpf/stackmap.c:324 [inline] bpf_get_stackid+0xee/0x120 kernel/bpf/stackmap.c:300 ____bpf_get_stackid_raw_tp kernel/trace/bpf_trace.c:1810 [inline] bpf_get_stackid_raw_tp+0xf6/0x120 kernel/trace/bpf_trace.c:1799 bpf_prog_e6fc920cfeff8120+0x2a/0x32 bpf_dispatcher_nop_func include/linux/bpf.h:1332 [inline] __bpf_prog_run include/linux/filter.h:718 [inline] bpf_prog_run include/linux/filter.h:725 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2257 [inline] bpf_trace_run2+0x104/0x1c0 kernel/trace/bpf_trace.c:2298 __traceiter_kfree+0x2e/0x50 include/trace/events/kmem.h:94 __do_trace_kfree include/trace/events/kmem.h:94 [inline] trace_kfree include/trace/events/kmem.h:94 [inline] kfree+0x27b/0x320 mm/slub.c:4866 security_sk_free+0x38/0x80 security/security.c:4904 sk_prot_free net/core/sock.c:2271 [inline] __sk_destruct+0x392/0x4c0 net/core/sock.c:2373 sk_destruct net/core/sock.c:2401 [inline] __sk_free+0x227/0x270 net/core/sock.c:2412 sk_free+0x39/0x80 net/core/sock.c:2423 sock_put include/net/sock.h:1960 [inline] tcp_close+0x8d/0xd0 net/ipv4/tcp.c:3278 inet_release+0xcb/0xf0 net/ipv4/af_inet.c:435 __sock_release net/socket.c:649 [inline] sock_close+0x6b/0x150 net/socket.c:1439 __fput+0x29b/0x650 fs/file_table.c:468 fput_close_sync+0x6e/0x120 fs/file_table.c:573 __do_sys_close fs/open.c:1587 [inline] __se_sys_close fs/open.c:1572 [inline] __x64_sys_close+0x56/0xf0 fs/open.c:1572 x64_sys_call+0x2738/0x2ff0 arch/x86/include/generated/asm/syscalls_64.h:4 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd2/0x200 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffff88811a3d88d0 of 8 bytes by task 8810 on cpu 1: memcmp lib/string.c:683 [inline] bcmp+0x23/0x90 lib/string.c:715 memcmp include/linux/fortify-string.h:727 [inline] __bpf_get_stackid+0x371/0x800 kernel/bpf/stackmap.c:279 ____bpf_get_stackid kernel/bpf/stackmap.c:324 [inline] bpf_get_stackid+0xee/0x120 kernel/bpf/stackmap.c:300 ____bpf_get_stackid_raw_tp kernel/trace/bpf_trace.c:1810 [inline] bpf_get_stackid_raw_tp+0xf6/0x120 kernel/trace/bpf_trace.c:1799 bpf_prog_e6fc920cfeff8120+0x2a/0x32 bpf_dispatcher_nop_func include/linux/bpf.h:1332 [inline] __bpf_prog_run include/linux/filter.h:718 [inline] bpf_prog_run include/linux/filter.h:725 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2257 [inline] bpf_trace_run2+0x104/0x1c0 kernel/trace/bpf_trace.c:2298 __traceiter_kfree+0x2e/0x50 include/trace/events/kmem.h:94 __do_trace_kfree include/trace/events/kmem.h:94 [inline] trace_kfree include/trace/events/kmem.h:94 [inline] kfree+0x27b/0x320 mm/slub.c:4866 iter_file_splice_write+0x93d/0xa60 fs/splice.c:770 do_splice_from fs/splice.c:938 [inline] direct_splice_actor+0x156/0x2a0 fs/splice.c:1161 splice_direct_to_actor+0x312/0x680 fs/splice.c:1105 do_splice_direct_actor fs/splice.c:1204 [inline] do_splice_direct+0xda/0x150 fs/splice.c:1230 do_sendfile+0x380/0x650 fs/read_write.c:1370 __do_sys_sendfile64 fs/read_write.c:1431 [inline] __se_sys_sendfile64 fs/read_write.c:1417 [inline] __x64_sys_sendfile64+0x105/0x150 fs/read_write.c:1417 x64_sys_call+0x2bb0/0x2ff0 arch/x86/include/generated/asm/syscalls_64.h:41 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd2/0x200 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0xffffffff8567feb2 -> 0xffffffff81933b9b Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 8810 Comm: syz.5.1837 Not tainted syzkaller #0 PREEMPT(voluntary) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 ==================================================================