================================================================== BUG: KCSAN: data-race in __anon_vma_prepare / do_anonymous_page write to 0xffff88813bbd9718 of 8 bytes by task 11224 on cpu 0: __anon_vma_prepare+0x148/0x2c0 mm/rmap.c:213 anon_vma_prepare include/linux/rmap.h:159 [inline] do_anonymous_page+0x784/0x9c0 mm/memory.c:4072 handle_pte_fault mm/memory.c:4929 [inline] __handle_mm_fault mm/memory.c:5073 [inline] handle_mm_fault+0x8dc/0xb20 mm/memory.c:5219 do_user_addr_fault+0x4a1/0x980 arch/x86/mm/fault.c:1428 handle_page_fault arch/x86/mm/fault.c:1519 [inline] exc_page_fault+0x60/0x160 arch/x86/mm/fault.c:1575 asm_exc_page_fault+0x22/0x30 arch/x86/include/asm/idtentry.h:570 read to 0xffff88813bbd9718 of 8 bytes by task 11227 on cpu 1: anon_vma_prepare include/linux/rmap.h:156 [inline] do_anonymous_page+0x123/0x9c0 mm/memory.c:4072 handle_pte_fault mm/memory.c:4929 [inline] __handle_mm_fault mm/memory.c:5073 [inline] handle_mm_fault+0x8dc/0xb20 mm/memory.c:5219 do_user_addr_fault+0x4a1/0x980 arch/x86/mm/fault.c:1428 handle_page_fault arch/x86/mm/fault.c:1519 [inline] exc_page_fault+0x60/0x160 arch/x86/mm/fault.c:1575 asm_exc_page_fault+0x22/0x30 arch/x86/include/asm/idtentry.h:570 __put_user_4+0x12/0x20 arch/x86/lib/putuser.S:93 __sys_socketpair+0xb6/0x420 net/socket.c:1685 __do_sys_socketpair net/socket.c:1751 [inline] __se_sys_socketpair net/socket.c:1748 [inline] __x64_sys_socketpair+0x4e/0x60 net/socket.c:1748 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd value changed: 0x0000000000000000 -> 0xffff888104dcd2a0 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 11227 Comm: syz-executor.0 Not tainted 6.2.0-rc6-syzkaller-00050-g9f266ccaa2f5-dirty #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 ================================================================== __nla_validate_parse: 40 callbacks suppressed netlink: 184 bytes leftover after parsing attributes in process `syz-executor.0'.