capability: warning: `syz-executor.2' uses deprecated v2 capabilities in a way that may be insecure ================================================================== BUG: KCSAN: data-race in delete_from_page_cache_batch / folio_mapping write to 0xffffea00050a65d8 of 8 bytes by task 17315 on cpu 0: page_cache_delete_batch mm/filemap.c:307 [inline] delete_from_page_cache_batch+0x32a/0x710 mm/filemap.c:333 truncate_inode_pages_range+0x1bd/0x6a0 mm/truncate.c:368 truncate_inode_pages mm/truncate.c:448 [inline] truncate_inode_pages_final+0x55/0x60 mm/truncate.c:483 ext4_evict_inode+0x174/0xdc0 fs/ext4/inode.c:193 evict+0x1aa/0x410 fs/inode.c:664 iput_final fs/inode.c:1775 [inline] iput+0x42c/0x5b0 fs/inode.c:1801 dentry_unlink_inode+0x22a/0x240 fs/dcache.c:401 __dentry_kill+0x2db/0x4a0 fs/dcache.c:607 dentry_kill+0x8d/0x1e0 dput+0x118/0x1f0 fs/dcache.c:913 __fput+0x41d/0x630 fs/file_table.c:402 ____fput+0x15/0x20 fs/file_table.c:422 task_work_run+0x135/0x1a0 kernel/task_work.c:180 exit_task_work include/linux/task_work.h:38 [inline] do_exit+0x604/0x16d0 kernel/exit.c:871 do_group_exit+0x101/0x150 kernel/exit.c:1021 get_signal+0xf4e/0x10a0 kernel/signal.c:2904 arch_do_signal_or_restart+0x95/0x4b0 arch/x86/kernel/signal.c:309 exit_to_user_mode_loop+0x6f/0xe0 kernel/entry/common.c:168 exit_to_user_mode_prepare+0x6c/0xb0 kernel/entry/common.c:204 irqentry_exit_to_user_mode+0x9/0x20 kernel/entry/common.c:309 irqentry_exit+0x12/0x40 kernel/entry/common.c:412 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:570 read to 0xffffea00050a65d8 of 8 bytes by task 17457 on cpu 1: folio_mapping+0x92/0x110 mm/util.c:772 folio_evictable mm/internal.h:162 [inline] move_folios_to_lru+0x132/0x690 mm/vmscan.c:1800 shrink_inactive_list mm/vmscan.c:1916 [inline] shrink_list mm/vmscan.c:2154 [inline] shrink_lruvec+0xd98/0x17a0 mm/vmscan.c:5626 shrink_node_memcgs mm/vmscan.c:5812 [inline] shrink_node+0xab3/0x15c0 mm/vmscan.c:5847 shrink_zones mm/vmscan.c:6086 [inline] do_try_to_free_pages+0x43d/0xce0 mm/vmscan.c:6148 try_to_free_mem_cgroup_pages+0x1e2/0x480 mm/vmscan.c:6463 try_charge_memcg+0x280/0xd30 mm/memcontrol.c:2742 obj_cgroup_charge_pages+0xab/0x130 mm/memcontrol.c:3254 __memcg_kmem_charge_page+0x9c/0x170 mm/memcontrol.c:3280 __alloc_pages+0x1bb/0x340 mm/page_alloc.c:4585 alloc_pages_mpol+0xb1/0x1d0 mm/mempolicy.c:2133 alloc_pages+0xe0/0x100 mm/mempolicy.c:2204 vm_area_alloc_pages mm/vmalloc.c:3063 [inline] __vmalloc_area_node mm/vmalloc.c:3139 [inline] __vmalloc_node_range+0x6d2/0xea0 mm/vmalloc.c:3320 kvmalloc_node+0x121/0x160 mm/util.c:632 kvmalloc include/linux/slab.h:738 [inline] xt_alloc_table_info+0x3d/0x80 net/netfilter/x_tables.c:1192 do_replace net/ipv4/netfilter/arp_tables.c:970 [inline] do_arpt_set_ctl+0x634/0x13b0 net/ipv4/netfilter/arp_tables.c:1421 nf_setsockopt+0x18d/0x1b0 net/netfilter/nf_sockopt.c:101 ip_setsockopt+0xe6/0x100 net/ipv4/ip_sockglue.c:1426 tcp_setsockopt+0x90/0xa0 net/ipv4/tcp.c:3704 sock_common_setsockopt+0x61/0x70 net/core/sock.c:3711 do_sock_setsockopt net/socket.c:2315 [inline] __sys_setsockopt+0x1d4/0x240 net/socket.c:2338 __do_sys_setsockopt net/socket.c:2347 [inline] __se_sys_setsockopt net/socket.c:2344 [inline] __x64_sys_setsockopt+0x66/0x80 net/socket.c:2344 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x44/0x110 arch/x86/entry/common.c:82 entry_SYSCALL_64_after_hwframe+0x63/0x6b value changed: 0xffff8881065902a0 -> 0x0000000000000000 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 17457 Comm: syz-executor.2 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 ==================================================================