================================================================== BUG: KCSAN: data-race in __refill_stock / drain_all_stock read-write to 0xffff888237d2a3c0 of 4 bytes by task 11785 on cpu 1: __refill_stock+0x7f/0xb0 mm/memcontrol.c:2364 refill_stock mm/memcontrol.c:2375 [inline] obj_cgroup_uncharge_pages+0xfb/0x1a0 mm/memcontrol.c:3234 __memcg_kmem_uncharge_page+0x53/0x100 mm/memcontrol.c:3307 free_pages_prepare mm/page_alloc.c:1127 [inline] free_unref_page_prepare+0x7c/0x2a0 mm/page_alloc.c:2347 free_unref_page+0x34/0x170 mm/page_alloc.c:2487 bpf_ringbuf_area_alloc kernel/bpf/ringbuf.c:143 [inline] bpf_ringbuf_alloc+0x2b0/0x2f0 kernel/bpf/ringbuf.c:170 ringbuf_map_alloc+0x167/0x1d0 kernel/bpf/ringbuf.c:204 map_create+0x713/0xa40 kernel/bpf/syscall.c:1210 __sys_bpf+0x62a/0x780 kernel/bpf/syscall.c:5365 __do_sys_bpf kernel/bpf/syscall.c:5487 [inline] __se_sys_bpf kernel/bpf/syscall.c:5485 [inline] __x64_sys_bpf+0x43/0x50 kernel/bpf/syscall.c:5485 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x44/0x110 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x63/0x6b read to 0xffff888237d2a3c0 of 4 bytes by task 11800 on cpu 0: drain_all_stock+0xd3/0x2d0 mm/memcontrol.c:2405 try_charge_memcg+0x6c5/0xd30 mm/memcontrol.c:2750 obj_cgroup_charge_pages+0xab/0x130 mm/memcontrol.c:3255 __memcg_kmem_charge_page+0x9c/0x170 mm/memcontrol.c:3281 __alloc_pages+0x1bb/0x340 mm/page_alloc.c:4585 __alloc_pages_node include/linux/gfp.h:238 [inline] alloc_pages_node include/linux/gfp.h:261 [inline] bpf_ringbuf_area_alloc kernel/bpf/ringbuf.c:122 [inline] bpf_ringbuf_alloc+0xba/0x2f0 kernel/bpf/ringbuf.c:170 ringbuf_map_alloc+0x167/0x1d0 kernel/bpf/ringbuf.c:204 map_create+0x713/0xa40 kernel/bpf/syscall.c:1210 __sys_bpf+0x62a/0x780 kernel/bpf/syscall.c:5365 __do_sys_bpf kernel/bpf/syscall.c:5487 [inline] __se_sys_bpf kernel/bpf/syscall.c:5485 [inline] __x64_sys_bpf+0x43/0x50 kernel/bpf/syscall.c:5485 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x44/0x110 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x63/0x6b value changed: 0x0000000e -> 0x00000009 Reported by Kernel Concurrency Sanitizer on: CPU: 0 PID: 11800 Comm: syz-executor.0 Not tainted 6.7.0-rc4-syzkaller-00039-g9ace34a8e446 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 ==================================================================