================================================================== BUG: KCSAN: data-race in data_push_tail / number write to 0xffffffff86e6f101 of 1 bytes by task 18385 on cpu 0: number+0x66d/0xbe0 lib/vsprintf.c:548 vsnprintf+0xa5e/0xe80 lib/vsprintf.c:2849 vscnprintf+0x3e/0x80 lib/vsprintf.c:2889 printk_sprint kernel/printk/printk.c:2222 [inline] vprintk_store+0x5f2/0xb50 kernel/printk/printk.c:2336 vprintk_emit+0xcc/0x4e0 kernel/printk/printk.c:2382 vprintk_default+0x22/0x30 kernel/printk/printk.c:2412 vprintk+0x7f/0x90 kernel/printk/printk_safe.c:50 _printk+0x76/0x96 kernel/printk/printk.c:2422 __show_regs+0xd6/0x340 arch/x86/kernel/process_64.c:89 show_regs_if_on_stack arch/x86/kernel/dumpstack.c:167 [inline] show_trace_log_lvl+0x562/0x620 arch/x86/kernel/dumpstack.c:292 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd6/0x122 lib/dump_stack.c:106 dump_stack+0x11/0x12 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:55 [inline] should_fail+0x242/0x250 lib/fault-inject.c:149 should_fail_usercopy+0x16/0x20 lib/fault-inject-usercopy.c:37 _copy_to_user+0x1a/0x90 lib/usercopy.c:29 copy_to_user include/linux/uaccess.h:160 [inline] bpf_verifier_vlog+0x137/0x230 kernel/bpf/verifier.c:312 __btf_verifier_log+0x80/0xa0 kernel/bpf/btf.c:1366 btf_verifier_log_hdr kernel/bpf/btf.c:1523 [inline] btf_parse_hdr+0x328/0x460 kernel/bpf/btf.c:4780 btf_parse kernel/bpf/btf.c:4904 [inline] btf_new_fd+0x2af/0x600 kernel/bpf/btf.c:6580 bpf_btf_load+0x69/0x80 kernel/bpf/syscall.c:4280 __sys_bpf+0x493/0x630 kernel/bpf/syscall.c:4962 __do_sys_bpf kernel/bpf/syscall.c:5021 [inline] __se_sys_bpf kernel/bpf/syscall.c:5019 [inline] __x64_sys_bpf+0x3f/0x50 kernel/bpf/syscall.c:5019 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x46/0xb0 read to 0xffffffff86e6f100 of 8 bytes by task 18386 on cpu 1: data_make_reusable kernel/printk/printk_ringbuffer.c:590 [inline] data_push_tail+0x10f/0x440 kernel/printk/printk_ringbuffer.c:675 data_alloc+0xbc/0x2b0 kernel/printk/printk_ringbuffer.c:1046 prb_reserve+0x897/0xbd0 kernel/printk/printk_ringbuffer.c:1555 vprintk_store+0x51c/0xb50 kernel/printk/printk.c:2326 vprintk_emit+0xcc/0x4e0 kernel/printk/printk.c:2382 vprintk_default+0x22/0x30 kernel/printk/printk.c:2412 vprintk+0x7f/0x90 kernel/printk/printk_safe.c:50 _printk+0x76/0x96 kernel/printk/printk.c:2422 fail_dump lib/fault-inject.c:48 [inline] should_fail+0x229/0x250 lib/fault-inject.c:149 should_fail_usercopy+0x16/0x20 lib/fault-inject-usercopy.c:37 _copy_to_user+0x1a/0x90 lib/usercopy.c:29 copy_to_user include/linux/uaccess.h:160 [inline] bpf_verifier_vlog+0x137/0x230 kernel/bpf/verifier.c:312 __btf_verifier_log+0x80/0xa0 kernel/bpf/btf.c:1366 __btf_verifier_log_type+0x2f6/0x3f0 kernel/bpf/btf.c:1404 btf_enum_check_meta+0x1ea/0x7d0 kernel/bpf/btf.c:3703 btf_check_meta kernel/bpf/btf.c:4476 [inline] btf_check_all_metas+0x232/0x540 kernel/bpf/btf.c:4500 btf_parse_type_sec+0xba/0xfa0 kernel/bpf/btf.c:4636 btf_parse kernel/bpf/btf.c:4914 [inline] btf_new_fd+0x3a3/0x600 kernel/bpf/btf.c:6580 bpf_btf_load+0x69/0x80 kernel/bpf/syscall.c:4280 __sys_bpf+0x493/0x630 kernel/bpf/syscall.c:4962 __do_sys_bpf kernel/bpf/syscall.c:5021 [inline] __se_sys_bpf kernel/bpf/syscall.c:5019 [inline] __x64_sys_bpf+0x3f/0x50 kernel/bpf/syscall.c:5019 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x46/0xb0 value changed: 0x00000000ffffe741 -> 0x3030303030303020 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 18386 Comm: syz-executor.4 Not tainted 5.19.0-rc1-syzkaller-00023-g34f4335c16a5-dirty #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ================================================================== CPU: 1 PID: 18386 Comm: syz-executor.4 Not tainted 5.19.0-rc1-syzkaller-00023-g34f4335c16a5-dirty #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd6/0x122 lib/dump_stack.c:106 dump_stack+0x11/0x12 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:55 [inline] should_fail+0x242/0x250 lib/fault-inject.c:149 should_fail_usercopy+0x16/0x20 lib/fault-inject-usercopy.c:37 _copy_to_user+0x1a/0x90 lib/usercopy.c:29 copy_to_user include/linux/uaccess.h:160 [inline] bpf_verifier_vlog+0x137/0x230 kernel/bpf/verifier.c:312 __btf_verifier_log+0x80/0xa0 kernel/bpf/btf.c:1366 __btf_verifier_log_type+0x2f6/0x3f0 kernel/bpf/btf.c:1404 btf_enum_check_meta+0x1ea/0x7d0 kernel/bpf/btf.c:3703 btf_check_meta kernel/bpf/btf.c:4476 [inline] btf_check_all_metas+0x232/0x540 kernel/bpf/btf.c:4500 btf_parse_type_sec+0xba/0xfa0 kernel/bpf/btf.c:4636 btf_parse kernel/bpf/btf.c:4914 [inline] btf_new_fd+0x3a3/0x600 kernel/bpf/btf.c:6580 bpf_btf_load+0x69/0x80 kernel/bpf/syscall.c:4280 __sys_bpf+0x493/0x630 kernel/bpf/syscall.c:4962 __do_sys_bpf kernel/bpf/syscall.c:5021 [inline] __se_sys_bpf kernel/bpf/syscall.c:5019 [inline] __x64_sys_bpf+0x3f/0x50 kernel/bpf/syscall.c:5019 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x46/0xb0 RIP: 0033:0x7fbb2245b109 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fbb21bd1168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: ffffffffffffffda RBX: 00007fbb2256df60 RCX: 00007fbb2245b109 RDX: 0000000000000020 RSI: 0000000020000100 RDI: 0000000000000012 RBP: 00007fbb21bd11d0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 R13: 00007ffe28c7676f R14: 00007fbb21bd1300 R15: 0000000000022000 syz-executor.4 (18386) used greatest stack depth: 10928 bytes left