================================================================== BUG: KCSAN: data-race in mem_cgroup_flush_stats_ratelimited / tick_do_update_jiffies64 read-write to 0xffffffff868099c0 of 8 bytes by interrupt on cpu 0: tick_do_update_jiffies64+0x113/0x1c0 kernel/time/tick-sched.c:118 tick_sched_do_timer kernel/time/tick-sched.c:232 [inline] tick_nohz_handler+0x7f/0x2d0 kernel/time/tick-sched.c:290 __run_hrtimer kernel/time/hrtimer.c:1761 [inline] __hrtimer_run_queues+0x20c/0x5a0 kernel/time/hrtimer.c:1825 hrtimer_interrupt+0x21a/0x460 kernel/time/hrtimer.c:1887 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1039 [inline] __sysvec_apic_timer_interrupt+0x5c/0x1d0 arch/x86/kernel/apic/apic.c:1056 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1050 [inline] sysvec_apic_timer_interrupt+0x6f/0x80 arch/x86/kernel/apic/apic.c:1050 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 __outw arch/x86/include/asm/shared/io.h:23 [inline] iowrite16+0x37/0xa0 lib/iomap.c:213 vp_notify+0x2f/0x40 drivers/virtio/virtio_pci_common.c:55 virtqueue_notify drivers/virtio/virtio_ring.c:2494 [inline] virtqueue_kick+0x244/0x290 drivers/virtio/virtio_ring.c:2517 request_entropy drivers/char/hw_random/virtio-rng.c:63 [inline] copy_data+0x14d/0x180 drivers/char/hw_random/virtio-rng.c:74 virtio_read+0xf6/0x150 drivers/char/hw_random/virtio-rng.c:114 rng_get_data drivers/char/hw_random/core.c:187 [inline] rng_dev_read+0x1db/0x740 drivers/char/hw_random/core.c:230 do_loop_readv_writev fs/read_write.c:847 [inline] vfs_readv+0x3fb/0x690 fs/read_write.c:1020 do_preadv fs/read_write.c:1132 [inline] __do_sys_preadv fs/read_write.c:1179 [inline] __se_sys_preadv fs/read_write.c:1174 [inline] __x64_sys_preadv+0xfd/0x1c0 fs/read_write.c:1174 x64_sys_call+0x282a/0x2ff0 arch/x86/include/generated/asm/syscalls_64.h:296 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd2/0x200 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffffffff868099c0 of 8 bytes by task 7788 on cpu 1: mem_cgroup_flush_stats_ratelimited+0x29/0x70 mm/memcontrol.c:634 count_shadow_nodes+0x6a/0x230 mm/workingset.c:678 do_shrink_slab+0x63/0x680 mm/shrinker.c:384 shrink_slab_memcg mm/shrinker.c:550 [inline] shrink_slab+0x448/0x760 mm/shrinker.c:628 shrink_node_memcgs mm/vmscan.c:6053 [inline] shrink_node+0x6c3/0x2120 mm/vmscan.c:6092 shrink_zones mm/vmscan.c:6336 [inline] do_try_to_free_pages+0x3f6/0xcd0 mm/vmscan.c:6398 try_to_free_mem_cgroup_pages+0x1ab/0x410 mm/vmscan.c:6726 try_charge_memcg+0x358/0x9e0 mm/memcontrol.c:2357 obj_cgroup_charge_pages+0xa6/0x150 mm/memcontrol.c:2800 __memcg_kmem_charge_page+0x9f/0x170 mm/memcontrol.c:2844 __alloc_frozen_pages_noprof+0x188/0x360 mm/page_alloc.c:5165 alloc_pages_mpol+0xb3/0x250 mm/mempolicy.c:2416 alloc_frozen_pages_noprof mm/mempolicy.c:2487 [inline] alloc_pages_noprof+0x90/0x130 mm/mempolicy.c:2507 vm_area_alloc_pages mm/vmalloc.c:3642 [inline] __vmalloc_area_node mm/vmalloc.c:3720 [inline] __vmalloc_node_range_noprof+0x6f2/0xe00 mm/vmalloc.c:3893 __kvmalloc_node_noprof+0x30f/0x4e0 mm/slub.c:5074 ip_set_alloc+0x1f/0x30 net/netfilter/ipset/ip_set_core.c:261 hash_netiface_create+0x282/0x740 net/netfilter/ipset/ip_set_hash_gen.h:1568 ip_set_create+0x3cc/0x960 net/netfilter/ipset/ip_set_core.c:1109 nfnetlink_rcv_msg+0x4c3/0x590 net/netfilter/nfnetlink.c:302 netlink_rcv_skb+0x123/0x220 net/netlink/af_netlink.c:2552 nfnetlink_rcv+0x16b/0x1690 net/netfilter/nfnetlink.c:667 netlink_unicast_kernel net/netlink/af_netlink.c:1320 [inline] netlink_unicast+0x5bd/0x690 net/netlink/af_netlink.c:1346 netlink_sendmsg+0x58b/0x6b0 net/netlink/af_netlink.c:1896 sock_sendmsg_nosec net/socket.c:714 [inline] __sock_sendmsg+0x142/0x180 net/socket.c:729 ____sys_sendmsg+0x31e/0x4e0 net/socket.c:2614 ___sys_sendmsg+0x17b/0x1d0 net/socket.c:2668 __sys_sendmsg net/socket.c:2700 [inline] __do_sys_sendmsg net/socket.c:2705 [inline] __se_sys_sendmsg net/socket.c:2703 [inline] __x64_sys_sendmsg+0xd4/0x160 net/socket.c:2703 x64_sys_call+0x191e/0x2ff0 arch/x86/include/generated/asm/syscalls_64.h:47 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd2/0x200 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x00000000ffffbde9 -> 0x00000000ffffbdea Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 7788 Comm: syz.4.1219 Not tainted syzkaller #0 PREEMPT(voluntary) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 ================================================================== syz.4.1219 (7788) used greatest stack depth: 7448 bytes left