================================================================== BUG: KCSAN: data-race in mem_cgroup_flush_stats / tick_do_update_jiffies64 read-write to 0xffffffff85c079c0 of 8 bytes by interrupt on cpu 1: tick_do_update_jiffies64+0x112/0x1b0 kernel/time/tick-sched.c:118 tick_sched_do_timer kernel/time/tick-sched.c:199 [inline] tick_sched_timer+0x7e/0x2d0 kernel/time/tick-sched.c:1473 __run_hrtimer+0x132/0x420 kernel/time/hrtimer.c:1685 __hrtimer_run_queues kernel/time/hrtimer.c:1749 [inline] hrtimer_interrupt+0x36e/0xa70 kernel/time/hrtimer.c:1811 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1096 [inline] __sysvec_apic_timer_interrupt+0xa3/0x250 arch/x86/kernel/apic/apic.c:1113 sysvec_apic_timer_interrupt+0x88/0xb0 arch/x86/kernel/apic/apic.c:1107 asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:649 kcsan_setup_watchpoint+0x3e9/0x3f0 kernel/kcsan/core.c:694 batadv_nc_purge_orig_hash net/batman-adv/network-coding.c:405 [inline] batadv_nc_worker+0x3e4/0xc00 net/batman-adv/network-coding.c:719 process_one_work+0x3d3/0x720 kernel/workqueue.c:2289 worker_thread+0x618/0xa70 kernel/workqueue.c:2436 kthread+0x1a9/0x1e0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306 read to 0xffffffff85c079c0 of 8 bytes by task 13894 on cpu 0: __mem_cgroup_flush_stats mm/memcontrol.c:634 [inline] mem_cgroup_flush_stats+0x7f/0x110 mm/memcontrol.c:643 prepare_scan_count+0xad/0x7f0 mm/vmscan.c:2799 shrink_node+0x1cc/0x930 mm/vmscan.c:6139 shrink_zones+0x2c1/0x5d0 mm/vmscan.c:6379 do_try_to_free_pages+0x195/0x760 mm/vmscan.c:6441 try_to_free_mem_cgroup_pages+0x1d1/0x420 mm/vmscan.c:6756 reclaim_high+0xcd/0x110 mm/memcontrol.c:2389 mem_cgroup_handle_over_high+0x75/0x120 mm/memcontrol.c:2574 try_charge_memcg+0x886/0x9c0 mm/memcontrol.c:2812 try_charge mm/memcontrol.c:2823 [inline] charge_memcg+0x54/0x250 mm/memcontrol.c:6879 __mem_cgroup_charge+0x25/0xa0 mm/memcontrol.c:6900 mem_cgroup_charge include/linux/memcontrol.h:667 [inline] wp_page_copy+0x209/0x1460 mm/memory.c:3141 do_wp_page+0x2dd/0x780 handle_pte_fault mm/memory.c:4973 [inline] __handle_mm_fault mm/memory.c:5097 [inline] handle_mm_fault+0x5ef/0xa80 mm/memory.c:5218 do_user_addr_fault+0x4a1/0x980 arch/x86/mm/fault.c:1428 handle_page_fault arch/x86/mm/fault.c:1519 [inline] exc_page_fault+0x60/0x160 arch/x86/mm/fault.c:1575 asm_exc_page_fault+0x22/0x30 arch/x86/include/asm/idtentry.h:570 __put_user_nocheck_4+0x3/0x11 schedule_tail+0x46/0x60 kernel/sched/core.c:5148 ret_from_fork+0x8/0x30 arch/x86/entry/entry_64.S:291 value changed: 0x0000000100000d0b -> 0x0000000100000d0c Reported by Kernel Concurrency Sanitizer on: CPU: 0 PID: 13894 Comm: syz-executor.3 Not tainted 6.1.0-rc7-syzkaller-dirty #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 ==================================================================