FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 6915 Comm: syz-executor.4 Not tainted 6.8.0-rc2-syzkaller-00043-g2a6526c4f389 #0 ================================================================== BUG: KCSAN: data-race in data_push_tail / string write to 0xffffffff870c1870 of 1 bytes by task 6916 on cpu 0: string_nocheck lib/vsprintf.c:650 [inline] string+0x16c/0x200 lib/vsprintf.c:728 vsnprintf+0xa09/0xe20 lib/vsprintf.c:2824 vscnprintf+0x42/0x80 lib/vsprintf.c:2930 printk_sprint+0x30/0x2d0 kernel/printk/printk.c:2124 vprintk_store+0x56f/0x800 kernel/printk/printk.c:2238 vprintk_emit+0xd0/0x5d0 kernel/printk/printk.c:2284 vprintk_default+0x26/0x30 kernel/printk/printk.c:2318 vprintk+0x71/0x80 kernel/printk/printk_safe.c:45 _printk+0x7a/0xa0 kernel/printk/printk.c:2328 caif_disconnect_client+0x133/0x140 net/caif/cfcnfg.c:194 caif_release+0xea/0x220 net/caif/caif_socket.c:918 __sock_release net/socket.c:659 [inline] sock_close+0x64/0x140 net/socket.c:1421 __fput+0x299/0x630 fs/file_table.c:376 __fput_sync+0x44/0x50 fs/file_table.c:461 __do_sys_close fs/open.c:1554 [inline] __se_sys_close+0xfa/0x1a0 fs/open.c:1539 __x64_sys_close+0x1f/0x30 fs/open.c:1539 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x59/0x120 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x63/0x6b read to 0xffffffff870c1870 of 8 bytes by task 6915 on cpu 1: data_make_reusable kernel/printk/printk_ringbuffer.c:590 [inline] data_push_tail+0x102/0x430 kernel/printk/printk_ringbuffer.c:675 data_alloc+0xbe/0x2c0 kernel/printk/printk_ringbuffer.c:1046 prb_reserve+0x893/0xbc0 kernel/printk/printk_ringbuffer.c:1555 vprintk_store+0x53e/0x800 kernel/printk/printk.c:2228 vprintk_emit+0xd0/0x5d0 kernel/printk/printk.c:2284 vprintk_default+0x26/0x30 kernel/printk/printk.c:2318 vprintk+0x71/0x80 kernel/printk/printk_safe.c:45 _printk+0x7a/0xa0 kernel/printk/printk.c:2328 dump_stack_print_info+0xb4/0x120 lib/dump_stack.c:57 __dump_stack lib/dump_stack.c:87 [inline] dump_stack_lvl+0xce/0x130 lib/dump_stack.c:106 dump_stack+0x15/0x20 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:52 [inline] should_fail_ex+0x21f/0x230 lib/fault-inject.c:153 __should_failslab+0x92/0xa0 mm/failslab.c:44 should_failslab+0x9/0x20 mm/slub.c:3747 slab_pre_alloc_hook mm/slub.c:3763 [inline] slab_alloc_node mm/slub.c:3842 [inline] kmalloc_trace+0x55/0x2d0 mm/slub.c:4007 kmalloc include/linux/slab.h:590 [inline] kzalloc include/linux/slab.h:711 [inline] sctp_add_bind_addr+0x6f/0x1e0 net/sctp/bind_addr.c:150 sctp_copy_local_addr_list+0x19b/0x220 net/sctp/protocol.c:165 sctp_copy_one_addr+0x7d/0x400 net/sctp/bind_addr.c:466 sctp_bind_addr_copy+0x81/0x2b0 net/sctp/bind_addr.c:56 sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 net/sctp/associola.c:1588 sctp_connect_new_asoc+0x1cb/0x3a0 net/sctp/socket.c:1094 sctp_sendmsg_new_asoc net/sctp/socket.c:1692 [inline] sctp_sendmsg+0xefc/0x1900 net/sctp/socket.c:2003 inet_sendmsg+0x63/0x80 net/ipv4/af_inet.c:850 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg net/socket.c:745 [inline] __sys_sendto+0x22b/0x2f0 net/socket.c:2191 __do_sys_sendto net/socket.c:2203 [inline] __se_sys_sendto net/socket.c:2199 [inline] __x64_sys_sendto+0x78/0x90 net/socket.c:2199 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x59/0x120 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x63/0x6b value changed: 0x000000010000b45d -> 0x6e6f637369645f66 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 6915 Comm: syz-executor.4 Not tainted 6.8.0-rc2-syzkaller-00043-g2a6526c4f389 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 ================================================================== Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xda/0x130 lib/dump_stack.c:106 dump_stack+0x15/0x20 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:52 [inline] should_fail_ex+0x21f/0x230 lib/fault-inject.c:153 __should_failslab+0x92/0xa0 mm/failslab.c:44 should_failslab+0x9/0x20 mm/slub.c:3747 slab_pre_alloc_hook mm/slub.c:3763 [inline] slab_alloc_node mm/slub.c:3842 [inline] kmalloc_trace+0x55/0x2d0 mm/slub.c:4007 kmalloc include/linux/slab.h:590 [inline] kzalloc include/linux/slab.h:711 [inline] sctp_add_bind_addr+0x6f/0x1e0 net/sctp/bind_addr.c:150 sctp_copy_local_addr_list+0x19b/0x220 net/sctp/protocol.c:165 sctp_copy_one_addr+0x7d/0x400 net/sctp/bind_addr.c:466 sctp_bind_addr_copy+0x81/0x2b0 net/sctp/bind_addr.c:56 sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 net/sctp/associola.c:1588 sctp_connect_new_asoc+0x1cb/0x3a0 net/sctp/socket.c:1094 sctp_sendmsg_new_asoc net/sctp/socket.c:1692 [inline] sctp_sendmsg+0xefc/0x1900 net/sctp/socket.c:2003 inet_sendmsg+0x63/0x80 net/ipv4/af_inet.c:850 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg net/socket.c:745 [inline] __sys_sendto+0x22b/0x2f0 net/socket.c:2191 __do_sys_sendto net/socket.c:2203 [inline] __se_sys_sendto net/socket.c:2199 [inline] __x64_sys_sendto+0x78/0x90 net/socket.c:2199 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x59/0x120 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x63/0x6b RIP: 0033:0x7fd15ed1cda9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fd15e09e0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 00007fd15ee4af80 RCX: 00007fd15ed1cda9 RDX: 000000000000fef4 RSI: 0000000020000000 RDI: 0000000000000003 RBP: 00007fd15e09e120 R08: 0000000020000240 R09: 000000000000001c R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 R13: 000000000000000b R14: 00007fd15ee4af80 R15: 00007ffc6dc62ae8