================================================================== BUG: KCSAN: data-race in mem_cgroup_flush_stats / tick_do_update_jiffies64 read-write to 0xffffffff85a07980 of 8 bytes by interrupt on cpu 1: tick_do_update_jiffies64+0x112/0x1b0 kernel/time/tick-sched.c:118 tick_sched_do_timer kernel/time/tick-sched.c:199 [inline] tick_sched_timer+0x7e/0x2d0 kernel/time/tick-sched.c:1466 __run_hrtimer+0x132/0x420 kernel/time/hrtimer.c:1685 __hrtimer_run_queues kernel/time/hrtimer.c:1749 [inline] hrtimer_interrupt+0x36e/0xa70 kernel/time/hrtimer.c:1811 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1086 [inline] __sysvec_apic_timer_interrupt+0xa3/0x250 arch/x86/kernel/apic/apic.c:1103 sysvec_apic_timer_interrupt+0x88/0xb0 arch/x86/kernel/apic/apic.c:1097 asm_sysvec_apic_timer_interrupt+0x12/0x20 check_access kernel/kcsan/core.c:736 [inline] __tsan_read8+0xed/0x180 kernel/kcsan/core.c:1014 copy_present_pte+0x3c/0x4c0 mm/memory.c:942 copy_pte_range+0x420/0xbc0 mm/memory.c:1071 copy_pmd_range mm/memory.c:1157 [inline] copy_pud_range mm/memory.c:1194 [inline] copy_p4d_range mm/memory.c:1218 [inline] copy_page_range+0x5da/0x8e0 mm/memory.c:1291 dup_mmap+0x6e0/0xa60 kernel/fork.c:701 dup_mm+0x7c/0x210 kernel/fork.c:1521 copy_mm+0xce/0x140 kernel/fork.c:1573 copy_process+0xd66/0x20e0 kernel/fork.c:2234 kernel_clone+0x163/0x5c0 kernel/fork.c:2639 __do_sys_clone kernel/fork.c:2756 [inline] __se_sys_clone kernel/fork.c:2740 [inline] __x64_sys_clone+0xbd/0xf0 kernel/fork.c:2740 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae read to 0xffffffff85a07980 of 8 bytes by task 1822 on cpu 0: __mem_cgroup_flush_stats mm/memcontrol.c:643 [inline] mem_cgroup_flush_stats+0x7f/0x110 mm/memcontrol.c:652 shrink_node+0x2fc/0x1110 mm/vmscan.c:3126 shrink_zones+0x2c1/0x5d0 mm/vmscan.c:3458 do_try_to_free_pages+0x165/0x720 mm/vmscan.c:3516 try_to_free_mem_cgroup_pages+0x1cd/0x420 mm/vmscan.c:3830 reclaim_high+0xcd/0x110 mm/memcontrol.c:2325 mem_cgroup_handle_over_high+0x75/0x120 mm/memcontrol.c:2509 resume_user_mode_work include/linux/resume_user_mode.h:58 [inline] exit_to_user_mode_loop+0xa5/0x130 kernel/entry/common.c:169 exit_to_user_mode_prepare kernel/entry/common.c:201 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:283 [inline] syscall_exit_to_user_mode+0x6a/0x90 kernel/entry/common.c:294 do_syscall_64+0x37/0x70 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae value changed: 0x0000000100004d01 -> 0x0000000100004d02 Reported by Kernel Concurrency Sanitizer on: CPU: 0 PID: 1822 Comm: syz-executor.2 Not tainted 5.18.0-rc7-syzkaller-00119-gb015dcd62b86-dirty #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ==================================================================