================================================================== BUG: KCSAN: data-race in __delete_from_page_cache / shmem_getpage_gfp write to 0xffff8881072756b0 of 8 bytes by task 7769 on cpu 1: page_cache_delete mm/filemap.c:146 [inline] __delete_from_page_cache+0x1e1/0x2c0 mm/filemap.c:231 __remove_mapping+0x494/0x5f0 mm/vmscan.c:1276 shrink_page_list+0x1508/0x2620 mm/vmscan.c:1851 reclaim_pages+0x478/0x640 mm/vmscan.c:2595 madvise_cold_or_pageout_pte_range+0x63f/0x680 mm/madvise.c:475 walk_pmd_range mm/pagewalk.c:128 [inline] walk_pud_range mm/pagewalk.c:205 [inline] walk_p4d_range mm/pagewalk.c:240 [inline] walk_pgd_range mm/pagewalk.c:277 [inline] __walk_page_range+0x981/0x1160 mm/pagewalk.c:379 walk_page_range+0x131/0x300 mm/pagewalk.c:475 madvise_pageout_page_range mm/madvise.c:528 [inline] madvise_pageout mm/madvise.c:565 [inline] madvise_vma mm/madvise.c:993 [inline] do_madvise+0xa0b/0x1140 mm/madvise.c:1202 __do_sys_madvise mm/madvise.c:1228 [inline] __se_sys_madvise mm/madvise.c:1226 [inline] __x64_sys_madvise+0x5d/0x70 mm/madvise.c:1226 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x44/0xd0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae read to 0xffff8881072756b0 of 8 bytes by task 7763 on cpu 0: shmem_recalc_inode mm/shmem.c:363 [inline] shmem_getpage_gfp+0xf23/0x12c0 mm/shmem.c:1946 shmem_fault+0xd1/0x3c0 mm/shmem.c:2114 __do_fault mm/memory.c:3849 [inline] do_shared_fault mm/memory.c:4219 [inline] do_fault mm/memory.c:4297 [inline] handle_pte_fault mm/memory.c:4551 [inline] __handle_mm_fault mm/memory.c:4686 [inline] handle_mm_fault+0xc78/0x1590 mm/memory.c:4784 do_user_addr_fault+0x609/0xbe0 arch/x86/mm/fault.c:1397 handle_page_fault arch/x86/mm/fault.c:1485 [inline] exc_page_fault+0x91/0x290 arch/x86/mm/fault.c:1541 asm_exc_page_fault+0x1e/0x30 copy_user_enhanced_fast_string+0xe/0x30 copy_user_generic arch/x86/include/asm/uaccess_64.h:37 [inline] raw_copy_to_user arch/x86/include/asm/uaccess_64.h:58 [inline] _copy_to_user+0x77/0x90 lib/usercopy.c:33 copy_to_user include/linux/uaccess.h:200 [inline] extract_crng_user drivers/char/random.c:1074 [inline] urandom_read_nowarn+0x1f5/0x3a0 drivers/char/random.c:1811 __do_sys_getrandom drivers/char/random.c:2008 [inline] __se_sys_getrandom drivers/char/random.c:1983 [inline] __x64_sys_getrandom+0xd6/0x130 drivers/char/random.c:1983 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x44/0xd0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae value changed: 0x00000000000007cc -> 0x00000000000007cb Reported by Kernel Concurrency Sanitizer on: CPU: 0 PID: 7763 Comm: syz-executor.4 Not tainted 5.16.0-rc7-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ==================================================================