================================================================== BUG: KCSAN: data-race in mem_cgroup_flush_stats_ratelimited / tick_do_update_jiffies64 read-write to 0xffffffff868099c0 of 8 bytes by interrupt on cpu 1: tick_do_update_jiffies64+0x113/0x1c0 kernel/time/tick-sched.c:118 tick_sched_do_timer kernel/time/tick-sched.c:232 [inline] tick_nohz_handler+0x7f/0x2d0 kernel/time/tick-sched.c:290 __run_hrtimer kernel/time/hrtimer.c:1777 [inline] __hrtimer_run_queues+0x20f/0x5a0 kernel/time/hrtimer.c:1841 hrtimer_interrupt+0x21a/0x460 kernel/time/hrtimer.c:1903 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1041 [inline] __sysvec_apic_timer_interrupt+0x5f/0x1d0 arch/x86/kernel/apic/apic.c:1058 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1052 [inline] sysvec_apic_timer_interrupt+0x6f/0x80 arch/x86/kernel/apic/apic.c:1052 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 kcsan_setup_watchpoint+0x415/0x430 kernel/kcsan/core.c:705 strnchr+0x1e/0x40 lib/string.c:405 bpf_bprintf_prepare+0xc4/0xd20 kernel/bpf/helpers.c:829 ____bpf_trace_printk kernel/trace/bpf_trace.c:372 [inline] bpf_trace_printk+0x84/0x1c0 kernel/trace/bpf_trace.c:362 bpf_prog_b1367f0be6c54012+0x39/0x3f bpf_dispatcher_nop_func include/linux/bpf.h:1350 [inline] __bpf_prog_run include/linux/filter.h:721 [inline] bpf_prog_run include/linux/filter.h:728 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2075 [inline] bpf_trace_run2+0x107/0x1c0 kernel/trace/bpf_trace.c:2116 __traceiter_kfree+0x2e/0x50 include/trace/events/kmem.h:97 __do_trace_kfree include/trace/events/kmem.h:97 [inline] trace_kfree include/trace/events/kmem.h:97 [inline] kfree+0x351/0x400 mm/slub.c:6824 clear_mm_walk mm/vmscan.c:3871 [inline] lru_gen_shrink_lruvec mm/vmscan.c:5060 [inline] shrink_lruvec+0x2a5/0x1b50 mm/vmscan.c:5818 shrink_node_memcgs mm/vmscan.c:6054 [inline] shrink_node+0x686/0x2120 mm/vmscan.c:6095 shrink_zones mm/vmscan.c:6339 [inline] do_try_to_free_pages+0x3f6/0xcd0 mm/vmscan.c:6401 try_to_free_mem_cgroup_pages+0x1ab/0x410 mm/vmscan.c:6729 try_charge_memcg+0x383/0xa10 mm/memcontrol.c:2356 try_charge mm/memcontrol.c:2498 [inline] charge_memcg+0x51/0xc0 mm/memcontrol.c:4701 mem_cgroup_swapin_charge_folio+0xcc/0x150 mm/memcontrol.c:4787 __read_swap_cache_async+0x17b/0x2d0 mm/swap_state.c:481 swap_cluster_readahead+0x362/0x3c0 mm/swap_state.c:669 swapin_readahead+0xde/0x6f0 mm/swap_state.c:813 do_swap_page+0x2ae/0x2370 mm/memory.c:4713 handle_pte_fault mm/memory.c:6180 [inline] __handle_mm_fault mm/memory.c:6318 [inline] handle_mm_fault+0x9a5/0x2be0 mm/memory.c:6487 do_user_addr_fault+0x630/0x1080 arch/x86/mm/fault.c:1336 handle_page_fault arch/x86/mm/fault.c:1476 [inline] exc_page_fault+0x62/0xa0 arch/x86/mm/fault.c:1532 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618 read to 0xffffffff868099c0 of 8 bytes by task 21442 on cpu 0: mem_cgroup_flush_stats_ratelimited+0x29/0x70 mm/memcontrol.c:635 count_shadow_nodes+0x6a/0x230 mm/workingset.c:678 do_shrink_slab+0x63/0x680 mm/shrinker.c:384 shrink_slab_memcg mm/shrinker.c:550 [inline] shrink_slab+0x448/0x760 mm/shrinker.c:628 shrink_node_memcgs mm/vmscan.c:6056 [inline] shrink_node+0x6c3/0x2120 mm/vmscan.c:6095 shrink_zones mm/vmscan.c:6339 [inline] do_try_to_free_pages+0x3f6/0xcd0 mm/vmscan.c:6401 try_to_free_mem_cgroup_pages+0x1ab/0x410 mm/vmscan.c:6729 try_charge_memcg+0x383/0xa10 mm/memcontrol.c:2356 obj_cgroup_charge_pages+0xa6/0x150 mm/memcontrol.c:2799 __memcg_kmem_charge_page+0x9f/0x170 mm/memcontrol.c:2843 __alloc_frozen_pages_noprof+0x188/0x360 mm/page_alloc.c:5200 alloc_pages_mpol+0xb3/0x260 mm/mempolicy.c:2416 alloc_frozen_pages_noprof mm/mempolicy.c:2487 [inline] alloc_pages_noprof+0x90/0x130 mm/mempolicy.c:2507 vm_area_alloc_pages mm/vmalloc.c:3647 [inline] __vmalloc_area_node mm/vmalloc.c:3724 [inline] __vmalloc_node_range_noprof+0x7a5/0xed0 mm/vmalloc.c:3897 __bpf_map_area_alloc kernel/bpf/syscall.c:401 [inline] bpf_map_area_alloc+0xfa/0x150 kernel/bpf/syscall.c:408 array_map_alloc+0x1d3/0x3c0 kernel/bpf/arraymap.c:142 map_create+0x840/0xda0 kernel/bpf/syscall.c:1512 __sys_bpf+0x54e/0x7c0 kernel/bpf/syscall.c:6131 __do_sys_bpf kernel/bpf/syscall.c:6259 [inline] __se_sys_bpf kernel/bpf/syscall.c:6257 [inline] __x64_sys_bpf+0x41/0x50 kernel/bpf/syscall.c:6257 x64_sys_call+0x2aee/0x3000 arch/x86/include/generated/asm/syscalls_64.h:322 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd2/0x200 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x0000000100001d17 -> 0x0000000100001d18 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 21442 Comm: syz.5.6465 Tainted: G W syzkaller #0 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 ==================================================================