================================================================== BUG: KCSAN: data-race in __refill_stock / drain_all_stock read-write to 0xffff888237c2a2f0 of 4 bytes by task 22959 on cpu 0: __refill_stock+0x9b/0xd0 mm/memcontrol.c:2317 refill_stock mm/memcontrol.c:2328 [inline] obj_cgroup_uncharge_pages+0x123/0x1f0 mm/memcontrol.c:3088 __memcg_kmem_uncharge_page+0x53/0x100 mm/memcontrol.c:3161 free_pages_prepare mm/page_alloc.c:1446 [inline] free_pcp_prepare mm/page_alloc.c:1527 [inline] free_unref_page_prepare+0x62/0x2d0 mm/page_alloc.c:3388 free_unref_page+0x34/0x190 mm/page_alloc.c:3483 vfree+0x27c/0x420 mm/vmalloc.c:2742 __vmalloc_area_node mm/vmalloc.c:3082 [inline] __vmalloc_node_range+0xe85/0xf50 mm/vmalloc.c:3199 __bpf_map_area_alloc kernel/bpf/syscall.c:332 [inline] bpf_map_area_alloc+0xd8/0x100 kernel/bpf/syscall.c:339 bloom_map_alloc+0x22d/0x380 kernel/bpf/bloom_filter.c:145 find_and_alloc_map kernel/bpf/syscall.c:131 [inline] map_create+0x398/0x710 kernel/bpf/syscall.c:1138 __sys_bpf+0x60c/0x810 kernel/bpf/syscall.c:4974 __do_sys_bpf kernel/bpf/syscall.c:5096 [inline] __se_sys_bpf kernel/bpf/syscall.c:5094 [inline] __x64_sys_bpf+0x43/0x50 kernel/bpf/syscall.c:5094 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd read to 0xffff888237c2a2f0 of 4 bytes by task 22954 on cpu 1: drain_all_stock+0xcc/0x2a0 mm/memcontrol.c:2358 try_charge_memcg+0x6d0/0xd10 mm/memcontrol.c:2703 obj_cgroup_charge_pages+0xbd/0x1c0 mm/memcontrol.c:3109 __memcg_kmem_charge_page+0x1d5/0x2c0 mm/memcontrol.c:3135 __alloc_pages+0x1bb/0x340 mm/page_alloc.c:5609 alloc_pages+0x3e1/0x4e0 vm_area_alloc_pages mm/vmalloc.c:2953 [inline] __vmalloc_area_node mm/vmalloc.c:3029 [inline] __vmalloc_node_range+0x736/0xf50 mm/vmalloc.c:3199 __bpf_map_area_alloc kernel/bpf/syscall.c:332 [inline] bpf_map_area_alloc+0xd8/0x100 kernel/bpf/syscall.c:339 bloom_map_alloc+0x22d/0x380 kernel/bpf/bloom_filter.c:145 find_and_alloc_map kernel/bpf/syscall.c:131 [inline] map_create+0x398/0x710 kernel/bpf/syscall.c:1138 __sys_bpf+0x60c/0x810 kernel/bpf/syscall.c:4974 __do_sys_bpf kernel/bpf/syscall.c:5096 [inline] __se_sys_bpf kernel/bpf/syscall.c:5094 [inline] __x64_sys_bpf+0x43/0x50 kernel/bpf/syscall.c:5094 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd value changed: 0x00000001 -> 0x00000022 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 22954 Comm: syz-executor.2 Not tainted 6.3.0-rc4-syzkaller-00161-g62bad54b26db #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 ================================================================== syz-executor.2 (22954) used greatest stack depth: 11432 bytes left