================================================================== BUG: KCSAN: data-race in mem_cgroup_flush_stats_ratelimited / tick_do_update_jiffies64 read-write to 0xffffffff868099c0 of 8 bytes by interrupt on cpu 0: tick_do_update_jiffies64+0x113/0x1c0 kernel/time/tick-sched.c:118 tick_sched_do_timer kernel/time/tick-sched.c:232 [inline] tick_nohz_handler+0x7f/0x2d0 kernel/time/tick-sched.c:290 __run_hrtimer kernel/time/hrtimer.c:1777 [inline] __hrtimer_run_queues+0x20f/0x5a0 kernel/time/hrtimer.c:1841 hrtimer_interrupt+0x21a/0x460 kernel/time/hrtimer.c:1903 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1041 [inline] __sysvec_apic_timer_interrupt+0x5f/0x1d0 arch/x86/kernel/apic/apic.c:1058 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1052 [inline] sysvec_apic_timer_interrupt+0x6f/0x80 arch/x86/kernel/apic/apic.c:1052 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 arch_atomic64_read arch/x86/include/asm/atomic64_64.h:15 [inline] raw_atomic64_read include/linux/atomic/atomic-arch-fallback.h:2583 [inline] raw_atomic_long_read include/linux/atomic/atomic-long.h:38 [inline] atomic_long_read include/linux/atomic/atomic-instrumented.h:3189 [inline] find_watchpoint kernel/kcsan/core.c:131 [inline] check_access kernel/kcsan/core.c:737 [inline] __tsan_read8+0x2c/0x190 kernel/kcsan/core.c:1025 cap_capable_helper security/commoncap.c:82 [inline] cap_capable+0x45/0x210 security/commoncap.c:128 cap_vm_enough_memory+0x37/0x40 security/commoncap.c:1445 security_vm_enough_memory_mm+0x68/0x130 security/security.c:1269 mprotect_fixup+0x262/0x570 mm/mprotect.c:807 do_mprotect_pkey+0x6d6/0x980 mm/mprotect.c:990 __do_sys_mprotect mm/mprotect.c:1011 [inline] __se_sys_mprotect mm/mprotect.c:1008 [inline] __x64_sys_mprotect+0x48/0x60 mm/mprotect.c:1008 x64_sys_call+0x2752/0x3000 arch/x86/include/generated/asm/syscalls_64.h:11 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd2/0x200 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffffffff868099c0 of 8 bytes by task 10212 on cpu 1: mem_cgroup_flush_stats_ratelimited+0x29/0x70 mm/memcontrol.c:635 count_shadow_nodes+0x6a/0x230 mm/workingset.c:678 do_shrink_slab+0x63/0x680 mm/shrinker.c:384 shrink_slab_memcg mm/shrinker.c:550 [inline] shrink_slab+0x448/0x760 mm/shrinker.c:628 shrink_node_memcgs mm/vmscan.c:6056 [inline] shrink_node+0x6c3/0x2120 mm/vmscan.c:6095 shrink_zones mm/vmscan.c:6339 [inline] do_try_to_free_pages+0x3f6/0xcd0 mm/vmscan.c:6401 try_to_free_mem_cgroup_pages+0x1ab/0x410 mm/vmscan.c:6729 try_charge_memcg+0x383/0xa10 mm/memcontrol.c:2356 obj_cgroup_charge_pages+0xa6/0x150 mm/memcontrol.c:2799 __memcg_kmem_charge_page+0x9f/0x170 mm/memcontrol.c:2843 __alloc_frozen_pages_noprof+0x188/0x360 mm/page_alloc.c:5195 alloc_pages_mpol+0xb3/0x260 mm/mempolicy.c:2416 alloc_frozen_pages_noprof mm/mempolicy.c:2487 [inline] alloc_pages_noprof+0x90/0x130 mm/mempolicy.c:2507 vm_area_alloc_pages mm/vmalloc.c:3647 [inline] __vmalloc_area_node mm/vmalloc.c:3724 [inline] __vmalloc_node_range_noprof+0x7a5/0xed0 mm/vmalloc.c:3897 __kvmalloc_node_noprof+0x483/0x670 mm/slub.c:7134 ip_set_alloc+0x24/0x30 net/netfilter/ipset/ip_set_core.c:261 hash_netiface_create+0x282/0x740 net/netfilter/ipset/ip_set_hash_gen.h:1568 ip_set_create+0x3cc/0x970 net/netfilter/ipset/ip_set_core.c:1109 nfnetlink_rcv_msg+0x4c6/0x590 net/netfilter/nfnetlink.c:302 netlink_rcv_skb+0x123/0x220 net/netlink/af_netlink.c:2552 nfnetlink_rcv+0x167/0x16c0 net/netfilter/nfnetlink.c:669 netlink_unicast_kernel net/netlink/af_netlink.c:1320 [inline] netlink_unicast+0x5c0/0x690 net/netlink/af_netlink.c:1346 netlink_sendmsg+0x58b/0x6b0 net/netlink/af_netlink.c:1896 sock_sendmsg_nosec net/socket.c:727 [inline] __sock_sendmsg+0x145/0x180 net/socket.c:742 ____sys_sendmsg+0x31e/0x4e0 net/socket.c:2630 ___sys_sendmsg+0x17b/0x1d0 net/socket.c:2684 __sys_sendmsg net/socket.c:2716 [inline] __do_sys_sendmsg net/socket.c:2721 [inline] __se_sys_sendmsg net/socket.c:2719 [inline] __x64_sys_sendmsg+0xd4/0x160 net/socket.c:2719 x64_sys_call+0x191e/0x3000 arch/x86/include/generated/asm/syscalls_64.h:47 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd2/0x200 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x00000000ffffb5af -> 0x00000000ffffb5b0 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 10212 Comm: syz.1.3017 Not tainted syzkaller #0 PREEMPT(voluntary) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 ================================================================== syz.1.3017 (10212) used greatest stack depth: 7416 bytes left