RBP: 00007f8386d87090 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 R13: 0000000000000000 R14: 00007f8388945fa0 R15: 00007ffcf8d12908 ================================================================== BUG: KCSAN: data-race in data_alloc / prb_reserve write to 0xffffffff8688f5f8 of 8 bytes by task 9274 on cpu 1: data_alloc+0x27d/0x2b0 kernel/printk/printk_ringbuffer.c:1096 prb_reserve+0x808/0xaf0 kernel/printk/printk_ringbuffer.c:1669 vprintk_store+0x56d/0x860 kernel/printk/printk.c:2326 vprintk_emit+0x178/0x650 kernel/printk/printk.c:2426 vprintk_default+0x26/0x30 kernel/printk/printk.c:2465 vprintk+0x1d/0x30 kernel/printk/printk_safe.c:82 _printk+0x79/0xa0 kernel/printk/printk.c:2475 fail_dump lib/fault-inject.c:66 [inline] should_fail_ex+0x24d/0x280 lib/fault-inject.c:174 should_failslab+0x8c/0xb0 mm/failslab.c:46 slab_pre_alloc_hook mm/slub.c:4100 [inline] slab_alloc_node mm/slub.c:4176 [inline] kmem_cache_alloc_noprof+0x50/0x310 mm/slub.c:4203 mt_alloc_one lib/maple_tree.c:176 [inline] mas_alloc_nodes+0x265/0x520 lib/maple_tree.c:1249 mas_node_count_gfp lib/maple_tree.c:1331 [inline] mas_preallocate+0x456/0x680 lib/maple_tree.c:5501 vma_iter_prealloc mm/vma.h:409 [inline] __split_vma+0x239/0x610 mm/vma.c:490 vms_gather_munmap_vmas+0x172/0x7a0 mm/vma.c:1315 do_vmi_align_munmap+0x1a4/0x3d0 mm/vma.c:1483 do_vmi_munmap+0x1db/0x220 mm/vma.c:1540 unmap_source_vma mm/mremap.c:1085 [inline] move_vma+0x9b6/0xce0 mm/mremap.c:1274 mremap_to+0x4d8/0x510 mm/mremap.c:1443 do_mremap mm/mremap.c:1727 [inline] __do_sys_mremap mm/mremap.c:1784 [inline] __se_sys_mremap+0x549/0x6f0 mm/mremap.c:1752 __x64_sys_mremap+0x67/0x80 mm/mremap.c:1752 x64_sys_call+0x2ba9/0x2fb0 arch/x86/include/generated/asm/syscalls_64.h:26 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd0/0x1a0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffffffff8688f5f8 of 8 bytes by task 9270 on cpu 0: desc_read kernel/printk/printk_ringbuffer.c:482 [inline] desc_push_tail kernel/printk/printk_ringbuffer.c:778 [inline] desc_reserve kernel/printk/printk_ringbuffer.c:924 [inline] prb_reserve+0x221/0xaf0 kernel/printk/printk_ringbuffer.c:1619 vprintk_store+0x56d/0x860 kernel/printk/printk.c:2326 vprintk_emit+0x178/0x650 kernel/printk/printk.c:2426 vprintk_default+0x26/0x30 kernel/printk/printk.c:2465 vprintk+0x1d/0x30 kernel/printk/printk_safe.c:82 _printk+0x79/0xa0 kernel/printk/printk.c:2475 show_trace_log_lvl+0x50e/0x560 arch/x86/kernel/dumpstack.c:304 __dump_stack+0x1d/0x30 lib/dump_stack.c:94 dump_stack_lvl+0xe8/0x140 lib/dump_stack.c:120 dump_stack+0x15/0x1b lib/dump_stack.c:129 fail_dump lib/fault-inject.c:73 [inline] should_fail_ex+0x265/0x280 lib/fault-inject.c:174 should_failslab+0x8c/0xb0 mm/failslab.c:46 slab_pre_alloc_hook mm/slub.c:4100 [inline] slab_alloc_node mm/slub.c:4176 [inline] __do_kmalloc_node mm/slub.c:4326 [inline] __kmalloc_node_track_caller_noprof+0xa4/0x410 mm/slub.c:4346 kmemdup_noprof+0x2b/0x70 mm/util.c:137 _Z14kmemdup_noprofPKvU25pass_dynamic_object_size0mj include/linux/fortify-string.h:765 [inline] sidtab_sid2str_get+0xa0/0x130 security/selinux/ss/sidtab.c:625 sidtab_entry_to_string security/selinux/ss/services.c:1296 [inline] security_sid_to_context_core+0x1eb/0x2e0 security/selinux/ss/services.c:1399 security_sid_to_context+0x27/0x40 security/selinux/ss/services.c:1420 avc_audit_post_callback+0x9d/0x520 security/selinux/avc.c:703 common_lsm_audit+0x1b8/0x230 security/lsm_audit.c:473 slow_avc_audit+0x104/0x140 security/selinux/avc.c:779 avc_audit security/selinux/include/avc.h:127 [inline] avc_has_perm+0x128/0x150 security/selinux/avc.c:1198 selinux_socket_create+0xff/0x180 security/selinux/hooks.c:4699 security_socket_create+0x50/0x90 security/security.c:4553 __sock_create+0xe0/0x5b0 net/socket.c:1496 sock_create net/socket.c:1599 [inline] __sys_socket_create net/socket.c:1636 [inline] __sys_socket+0xb0/0x180 net/socket.c:1683 __do_sys_socket net/socket.c:1697 [inline] __se_sys_socket net/socket.c:1695 [inline] __x64_sys_socket+0x3f/0x50 net/socket.c:1695 x64_sys_call+0x285a/0x2fb0 arch/x86/include/generated/asm/syscalls_64.h:42 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd0/0x1a0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x00000000000e54f8 -> 0x00000000001854f8 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 9270 Comm: syz.0.13394 Not tainted 6.15.0-rc7-syzkaller-00175-g0f8c0258bf04 #0 PREEMPT(voluntary) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 ==================================================================