================================================================== BUG: KCSAN: data-race in __bpf_get_stackid / bcmp write to 0xffff888109b3bcc8 of 184 bytes by interrupt on cpu 1: __bpf_get_stackid+0x761/0x800 kernel/bpf/stackmap.c:288 ____bpf_get_stackid kernel/bpf/stackmap.c:324 [inline] bpf_get_stackid+0xee/0x120 kernel/bpf/stackmap.c:300 ____bpf_get_stackid_raw_tp kernel/trace/bpf_trace.c:1810 [inline] bpf_get_stackid_raw_tp+0xf6/0x120 kernel/trace/bpf_trace.c:1799 bpf_prog_e6fc920cfeff8120+0x2a/0x32 bpf_dispatcher_nop_func include/linux/bpf.h:1332 [inline] __bpf_prog_run include/linux/filter.h:718 [inline] bpf_prog_run include/linux/filter.h:725 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2257 [inline] bpf_trace_run3+0x10c/0x1d0 kernel/trace/bpf_trace.c:2299 __do_trace_kmem_cache_free include/trace/events/kmem.h:114 [inline] trace_kmem_cache_free include/trace/events/kmem.h:114 [inline] kmem_cache_free+0x257/0x300 mm/slub.c:4781 kfree_skbmem net/core/skbuff.c:-1 [inline] __kfree_skb+0x109/0x150 net/core/skbuff.c:1166 sk_skb_reason_drop+0xbd/0x270 net/core/skbuff.c:1203 kfree_skb_reason include/linux/skbuff.h:1275 [inline] kfree_skb include/linux/skbuff.h:1284 [inline] j1939_session_destroy net/can/j1939/transport.c:282 [inline] __j1939_session_release net/can/j1939/transport.c:294 [inline] kref_put include/linux/kref.h:65 [inline] j1939_session_put+0x156/0x290 net/can/j1939/transport.c:299 j1939_xtp_rx_eoma+0x1f0/0x260 net/can/j1939/transport.c:1412 j1939_tp_cmd_recv net/can/j1939/transport.c:2110 [inline] j1939_tp_recv+0x65b/0xa50 net/can/j1939/transport.c:2158 j1939_can_recv+0x43d/0x530 net/can/j1939/main.c:108 deliver net/can/af_can.c:575 [inline] can_rcv_filter+0x22d/0x4f0 net/can/af_can.c:609 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:5991 [inline] __netif_receive_skb+0x120/0x270 net/core/dev.c:6104 process_backlog+0x229/0x420 net/core/dev.c:6456 __napi_poll+0x63/0x310 net/core/dev.c:7506 napi_poll net/core/dev.c:7569 [inline] net_rx_action+0x391/0x830 net/core/dev.c:7696 handle_softirqs+0xba/0x290 kernel/softirq.c:579 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:968 smpboot_thread_fn+0x328/0x530 kernel/smpboot.c:160 kthread+0x486/0x510 kernel/kthread.c:463 ret_from_fork+0xda/0x150 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 read to 0xffff888109b3bd08 of 8 bytes by task 4064 on cpu 0: memcmp lib/string.c:683 [inline] bcmp+0x23/0x90 lib/string.c:715 memcmp include/linux/fortify-string.h:727 [inline] __bpf_get_stackid+0x371/0x800 kernel/bpf/stackmap.c:279 ____bpf_get_stackid kernel/bpf/stackmap.c:324 [inline] bpf_get_stackid+0xee/0x120 kernel/bpf/stackmap.c:300 ____bpf_get_stackid_raw_tp kernel/trace/bpf_trace.c:1810 [inline] bpf_get_stackid_raw_tp+0xf6/0x120 kernel/trace/bpf_trace.c:1799 bpf_prog_e6fc920cfeff8120+0x2a/0x32 bpf_dispatcher_nop_func include/linux/bpf.h:1332 [inline] __bpf_prog_run include/linux/filter.h:718 [inline] bpf_prog_run include/linux/filter.h:725 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2257 [inline] bpf_trace_run3+0x10c/0x1d0 kernel/trace/bpf_trace.c:2299 __do_trace_kmem_cache_free include/trace/events/kmem.h:114 [inline] trace_kmem_cache_free include/trace/events/kmem.h:114 [inline] kmem_cache_free+0x257/0x300 mm/slub.c:4781 free_buffer_head+0x48/0x1c0 fs/buffer.c:3041 try_to_free_buffers+0x11e/0x170 fs/buffer.c:2982 ext4_release_folio+0xb8/0x180 fs/ext4/inode.c:3457 filemap_release_folio+0xcd/0x150 mm/filemap.c:4355 mapping_evict_folio mm/truncate.c:311 [inline] mapping_try_invalidate+0x254/0x3f0 mm/truncate.c:535 invalidate_mapping_pages+0x27/0x40 mm/truncate.c:577 ext4_dio_write_iter fs/ext4/file.c:629 [inline] ext4_file_write_iter+0xe70/0xf00 fs/ext4/file.c:721 iter_file_splice_write+0x663/0xa60 fs/splice.c:738 do_splice_from fs/splice.c:938 [inline] direct_splice_actor+0x153/0x2a0 fs/splice.c:1161 splice_direct_to_actor+0x30f/0x680 fs/splice.c:1105 do_splice_direct_actor fs/splice.c:1204 [inline] do_splice_direct+0xda/0x150 fs/splice.c:1230 do_sendfile+0x380/0x650 fs/read_write.c:1370 __do_sys_sendfile64 fs/read_write.c:1431 [inline] __se_sys_sendfile64 fs/read_write.c:1417 [inline] __x64_sys_sendfile64+0x105/0x150 fs/read_write.c:1417 x64_sys_call+0x2bb0/0x2ff0 arch/x86/include/generated/asm/syscalls_64.h:41 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd2/0x200 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0xffffffff817acbe4 -> 0xffffffff84de402b Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 4064 Comm: syz.4.187 Not tainted syzkaller #0 PREEMPT(voluntary) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 ==================================================================