================================================================== BUG: KCSAN: data-race in __bpf_get_stackid / bcmp write to 0xffff88810b742190 of 104 bytes by task 157 on cpu 0: __bpf_get_stackid+0x761/0x800 kernel/bpf/stackmap.c:288 ____bpf_get_stackid kernel/bpf/stackmap.c:324 [inline] bpf_get_stackid+0xee/0x120 kernel/bpf/stackmap.c:300 ____bpf_get_stackid_raw_tp kernel/trace/bpf_trace.c:1811 [inline] bpf_get_stackid_raw_tp+0xf6/0x120 kernel/trace/bpf_trace.c:1800 bpf_prog_e6fc920cfeff8120+0x2a/0x32 bpf_dispatcher_nop_func include/linux/bpf.h:1322 [inline] __bpf_prog_run include/linux/filter.h:718 [inline] bpf_prog_run include/linux/filter.h:725 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2258 [inline] bpf_trace_run2+0x104/0x1c0 kernel/trace/bpf_trace.c:2299 __traceiter_kfree+0x2e/0x50 include/trace/events/kmem.h:94 __do_trace_kfree include/trace/events/kmem.h:94 [inline] trace_kfree include/trace/events/kmem.h:94 [inline] kfree+0x27b/0x320 mm/slub.c:4829 bpf_mem_cache_raw_free+0x23/0x40 kernel/bpf/memalloc.c:978 trie_free+0x87/0xd0 kernel/bpf/lpm_trie.c:645 bpf_map_free kernel/bpf/syscall.c:862 [inline] bpf_map_free_deferred+0xb3/0x140 kernel/bpf/syscall.c:888 process_one_work kernel/workqueue.c:3238 [inline] process_scheduled_works+0x4ce/0x9d0 kernel/workqueue.c:3321 worker_thread+0x582/0x770 kernel/workqueue.c:3402 kthread+0x486/0x510 kernel/kthread.c:464 ret_from_fork+0xda/0x150 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 read to 0xffff88810b7421e0 of 8 bytes by task 2995 on cpu 1: memcmp lib/string.c:683 [inline] bcmp+0x23/0x90 lib/string.c:715 memcmp include/linux/fortify-string.h:727 [inline] __bpf_get_stackid+0x371/0x800 kernel/bpf/stackmap.c:279 ____bpf_get_stackid kernel/bpf/stackmap.c:324 [inline] bpf_get_stackid+0xee/0x120 kernel/bpf/stackmap.c:300 ____bpf_get_stackid_raw_tp kernel/trace/bpf_trace.c:1811 [inline] bpf_get_stackid_raw_tp+0xf6/0x120 kernel/trace/bpf_trace.c:1800 bpf_prog_e6fc920cfeff8120+0x2a/0x32 bpf_dispatcher_nop_func include/linux/bpf.h:1322 [inline] __bpf_prog_run include/linux/filter.h:718 [inline] bpf_prog_run include/linux/filter.h:725 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2258 [inline] bpf_trace_run2+0x104/0x1c0 kernel/trace/bpf_trace.c:2299 __traceiter_kfree+0x2e/0x50 include/trace/events/kmem.h:94 __do_trace_kfree include/trace/events/kmem.h:94 [inline] trace_kfree include/trace/events/kmem.h:94 [inline] kfree+0x27b/0x320 mm/slub.c:4829 dev_uevent+0x1e7/0x3d0 drivers/base/core.c:2680 uevent_show+0x11a/0x200 drivers/base/core.c:2759 dev_attr_show+0x3f/0xa0 drivers/base/core.c:2424 sysfs_kf_seq_show+0x1a3/0x280 fs/sysfs/file.c:65 kernfs_seq_show+0x82/0xa0 fs/kernfs/file.c:205 seq_read_iter+0x316/0x940 fs/seq_file.c:230 kernfs_fop_read_iter+0xc4/0x300 fs/kernfs/file.c:279 new_sync_read fs/read_write.c:491 [inline] vfs_read+0x5cd/0x6f0 fs/read_write.c:572 ksys_read+0xda/0x1a0 fs/read_write.c:715 __do_sys_read fs/read_write.c:724 [inline] __se_sys_read fs/read_write.c:722 [inline] __x64_sys_read+0x40/0x50 fs/read_write.c:722 x64_sys_call+0x2d77/0x2fb0 arch/x86/include/generated/asm/syscalls_64.h:1 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd2/0x200 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0xffffffff81988c76 -> 0xffffffff813eacb6 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 2995 Comm: udevd Not tainted 6.16.0-rc2-syzkaller-00378-gb67ec639010f #0 PREEMPT(voluntary) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 ==================================================================