FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 ================================================================== BUG: KCSAN: data-race in data_push_tail / number write to 0xffffffff86ed4d27 of 1 bytes by task 31837 on cpu 0: number+0x7d0/0xa90 lib/vsprintf.c:564 vsnprintf+0xa44/0xe20 lib/vsprintf.c:2885 vscnprintf+0x42/0x80 lib/vsprintf.c:2925 printk_sprint+0x30/0x2d0 kernel/printk/printk.c:2124 vprintk_store+0x56f/0x800 kernel/printk/printk.c:2238 vprintk_emit+0xd0/0x5d0 kernel/printk/printk.c:2284 vprintk_default+0x26/0x30 kernel/printk/printk.c:2318 vprintk+0x71/0x80 kernel/printk/printk_safe.c:45 _printk+0x7a/0xa0 kernel/printk/printk.c:2328 set_capacity_and_notify+0x11d/0x170 block/genhd.c:86 loop_set_size+0x2e/0x70 drivers/block/loop.c:237 loop_configure+0xaf9/0xca0 drivers/block/loop.c:1100 lo_ioctl+0x682/0x12e0 blkdev_ioctl+0x375/0x460 block/ioctl.c:633 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:871 [inline] __se_sys_ioctl+0xcf/0x140 fs/ioctl.c:857 __x64_sys_ioctl+0x43/0x50 fs/ioctl.c:857 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x44/0x110 arch/x86/entry/common.c:82 entry_SYSCALL_64_after_hwframe+0x63/0x6b read to 0xffffffff86ed4d20 of 8 bytes by task 31843 on cpu 1: data_make_reusable kernel/printk/printk_ringbuffer.c:590 [inline] data_push_tail+0x102/0x430 kernel/printk/printk_ringbuffer.c:675 data_alloc+0xbe/0x2c0 kernel/printk/printk_ringbuffer.c:1046 prb_reserve+0x893/0xbc0 kernel/printk/printk_ringbuffer.c:1555 vprintk_store+0x53e/0x800 kernel/printk/printk.c:2228 vprintk_emit+0xd0/0x5d0 kernel/printk/printk.c:2284 vprintk_default+0x26/0x30 kernel/printk/printk.c:2318 vprintk+0x71/0x80 kernel/printk/printk_safe.c:45 _printk+0x7a/0xa0 kernel/printk/printk.c:2328 fail_dump lib/fault-inject.c:45 [inline] should_fail_ex+0x207/0x230 lib/fault-inject.c:153 __should_fail_alloc_page+0xfd/0x110 mm/fail_page_alloc.c:42 prepare_alloc_pages mm/page_alloc.c:4341 [inline] __alloc_pages+0x108/0x340 mm/page_alloc.c:4557 alloc_pages_mpol+0xb1/0x1d0 mm/mempolicy.c:2133 vma_alloc_folio+0x166/0x2b0 mm/mempolicy.c:2172 do_anonymous_page mm/memory.c:4171 [inline] do_pte_missing mm/memory.c:3728 [inline] handle_pte_fault mm/memory.c:5038 [inline] __handle_mm_fault mm/memory.c:5179 [inline] handle_mm_fault+0xee4/0x2dd0 mm/memory.c:5344 do_user_addr_fault arch/x86/mm/fault.c:1364 [inline] handle_page_fault arch/x86/mm/fault.c:1505 [inline] exc_page_fault+0x3ff/0x6c0 arch/x86/mm/fault.c:1561 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:570 value changed: 0x00000001000003c0 -> 0x742030206d6f7266 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 31843 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-15601-g4bbdb725a36b #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 ================================================================== CPU: 1 PID: 31843 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-15601-g4bbdb725a36b #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xda/0x130 lib/dump_stack.c:106 dump_stack+0x15/0x20 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:52 [inline] should_fail_ex+0x21f/0x230 lib/fault-inject.c:153 __should_fail_alloc_page+0xfd/0x110 mm/fail_page_alloc.c:42 prepare_alloc_pages mm/page_alloc.c:4341 [inline] __alloc_pages+0x108/0x340 mm/page_alloc.c:4557 alloc_pages_mpol+0xb1/0x1d0 mm/mempolicy.c:2133 vma_alloc_folio+0x166/0x2b0 mm/mempolicy.c:2172 do_anonymous_page mm/memory.c:4171 [inline] do_pte_missing mm/memory.c:3728 [inline] handle_pte_fault mm/memory.c:5038 [inline] __handle_mm_fault mm/memory.c:5179 [inline] handle_mm_fault+0xee4/0x2dd0 mm/memory.c:5344 do_user_addr_fault arch/x86/mm/fault.c:1364 [inline] handle_page_fault arch/x86/mm/fault.c:1505 [inline] exc_page_fault+0x3ff/0x6c0 arch/x86/mm/fault.c:1561 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:570 RIP: 0033:0x7f1b280276f0 Code: 39 4f 08 72 4c 8d 4d ff 85 ed 74 33 66 0f 1f 44 00 00 48 39 f0 72 1b 4d 8b 07 49 89 c1 49 29 f1 47 0f b6 0c 08 45 84 c9 74 08 <45> 88 0c 00 49 8b 47 10 48 83 c0 01 49 89 47 10 83 e9 01 73 d3 41 RSP: 002b:00007f1b273fd520 EFLAGS: 00010202 RAX: 0000000000028000 RBX: 00007f1b273fd5c0 RCX: 0000000000000063 RDX: 000000000000ec4e RSI: 0000000000004c4f RDI: 00007f1b273fd660 RBP: 0000000000000064 R08: 00007f1b1efde000 R09: 0000000000000073 R10: 0000000020000a42 R11: 000000000000050b R12: 0000000000004001 R13: 00007f1b280e9560 R14: 000000000000001c R15: 00007f1b273fd660 Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF loop1: detected capacity change from 0 to 512 EXT4-fs (loop1): orphan cleanup on readonly fs EXT4-fs error (device loop1): ext4_ext_check_inode:520: inode #4: comm syz-executor.1: pblk 0 bad header/extent: invalid magic - magic f3ff, entries 1, max 4(0), depth 0(0) EXT4-fs error (device loop1): ext4_quota_enable:7066: comm syz-executor.1: Bad quota inode: 4, type: 1 EXT4-fs warning (device loop1): ext4_enable_quotas:7107: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. EXT4-fs (loop1): Cannot turn on quotas: error -117 EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback.