================================================================== BUG: KCSAN: data-race in mem_cgroup_flush_stats_ratelimited / tick_do_update_jiffies64 read-write to 0xffffffff868099c0 of 8 bytes by interrupt on cpu 1: tick_do_update_jiffies64+0x113/0x1c0 kernel/time/tick-sched.c:118 tick_sched_do_timer kernel/time/tick-sched.c:232 [inline] tick_nohz_handler+0x7f/0x2d0 kernel/time/tick-sched.c:290 __run_hrtimer kernel/time/hrtimer.c:1761 [inline] __hrtimer_run_queues+0x20c/0x5a0 kernel/time/hrtimer.c:1825 hrtimer_interrupt+0x21a/0x460 kernel/time/hrtimer.c:1887 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1039 [inline] __sysvec_apic_timer_interrupt+0x5c/0x1d0 arch/x86/kernel/apic/apic.c:1056 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1050 [inline] sysvec_apic_timer_interrupt+0x6f/0x80 arch/x86/kernel/apic/apic.c:1050 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 kcsan_setup_watchpoint+0x415/0x430 kernel/kcsan/core.c:705 sized_strscpy+0xf1/0x1a0 lib/string.c:178 sized_strscpy include/linux/fortify-string.h:286 [inline] ____bpf_get_current_comm kernel/bpf/helpers.c:268 [inline] bpf_get_current_comm+0x44/0xb0 kernel/bpf/helpers.c:260 bpf_prog_22b6409c2f5c9c11+0x38/0x40 bpf_dispatcher_nop_func include/linux/bpf.h:1322 [inline] __bpf_prog_run include/linux/filter.h:718 [inline] bpf_prog_run include/linux/filter.h:725 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2258 [inline] bpf_trace_run2+0x107/0x1c0 kernel/trace/bpf_trace.c:2299 __traceiter_kfree+0x2b/0x50 include/trace/events/kmem.h:94 __do_trace_kfree include/trace/events/kmem.h:94 [inline] trace_kfree include/trace/events/kmem.h:94 [inline] kfree+0x27b/0x320 mm/slub.c:4829 clear_mm_walk mm/vmscan.c:3878 [inline] lru_gen_shrink_lruvec mm/vmscan.c:5052 [inline] shrink_lruvec+0x2a5/0x1b40 mm/vmscan.c:5805 shrink_node_memcgs mm/vmscan.c:6041 [inline] shrink_node+0x686/0x2120 mm/vmscan.c:6082 shrink_zones mm/vmscan.c:6326 [inline] do_try_to_free_pages+0x3f6/0xcd0 mm/vmscan.c:6388 try_to_free_mem_cgroup_pages+0x1ab/0x410 mm/vmscan.c:6716 try_charge_memcg+0x358/0x9e0 mm/memcontrol.c:2360 try_charge mm/memcontrol.c:2502 [inline] charge_memcg+0x51/0xc0 mm/memcontrol.c:4768 mem_cgroup_swapin_charge_folio+0xcc/0x150 mm/memcontrol.c:4854 __read_swap_cache_async+0x1df/0x350 mm/swap_state.c:441 swap_cluster_readahead+0x277/0x3e0 mm/swap_state.c:613 swapin_readahead+0xde/0x6f0 mm/swap_state.c:811 do_swap_page+0x301/0x2430 mm/memory.c:4603 handle_pte_fault mm/memory.c:6072 [inline] __handle_mm_fault mm/memory.c:6212 [inline] handle_mm_fault+0x9a5/0x2be0 mm/memory.c:6381 do_user_addr_fault+0x636/0x1090 arch/x86/mm/fault.c:1336 handle_page_fault arch/x86/mm/fault.c:1476 [inline] exc_page_fault+0x62/0xa0 arch/x86/mm/fault.c:1532 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623 read to 0xffffffff868099c0 of 8 bytes by task 3311 on cpu 0: mem_cgroup_flush_stats_ratelimited+0x29/0x70 mm/memcontrol.c:637 count_shadow_nodes+0x6a/0x230 mm/workingset.c:678 do_shrink_slab+0x60/0x680 mm/shrinker.c:384 shrink_slab_memcg mm/shrinker.c:550 [inline] shrink_slab+0x448/0x760 mm/shrinker.c:628 shrink_node_memcgs mm/vmscan.c:6043 [inline] shrink_node+0x6c3/0x2120 mm/vmscan.c:6082 shrink_zones mm/vmscan.c:6326 [inline] do_try_to_free_pages+0x3f6/0xcd0 mm/vmscan.c:6388 try_to_free_mem_cgroup_pages+0x1ab/0x410 mm/vmscan.c:6716 try_charge_memcg+0x358/0x9e0 mm/memcontrol.c:2360 try_charge mm/memcontrol.c:2502 [inline] charge_memcg+0x51/0xc0 mm/memcontrol.c:4768 mem_cgroup_swapin_charge_folio+0xcc/0x150 mm/memcontrol.c:4854 __read_swap_cache_async+0x1df/0x350 mm/swap_state.c:441 swap_cluster_readahead+0x376/0x3e0 mm/swap_state.c:632 swapin_readahead+0xde/0x6f0 mm/swap_state.c:811 do_swap_page+0x301/0x2430 mm/memory.c:4603 handle_pte_fault mm/memory.c:6072 [inline] __handle_mm_fault mm/memory.c:6212 [inline] handle_mm_fault+0x9a5/0x2be0 mm/memory.c:6381 do_user_addr_fault+0x636/0x1090 arch/x86/mm/fault.c:1336 handle_page_fault arch/x86/mm/fault.c:1476 [inline] exc_page_fault+0x62/0xa0 arch/x86/mm/fault.c:1532 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623 value changed: 0x00000000ffffa65f -> 0x00000000ffffa660 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 3311 Comm: syz-executor Not tainted 6.16.0-rc7-syzkaller-00142-gb711733e89a3 #0 PREEMPT(voluntary) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 ==================================================================