loop3: detected capacity change from 0 to 2048 ================================================================== BUG: KCSAN: data-race in _prb_read_valid / data_alloc write to 0xffffffff86881320 of 8 bytes by task 14970 on cpu 1: data_alloc+0x271/0x2b0 kernel/printk/printk_ringbuffer.c:1095 prb_reserve+0x808/0xaf0 kernel/printk/printk_ringbuffer.c:1669 vprintk_store+0x56d/0x860 kernel/printk/printk.c:2326 vprintk_emit+0x178/0x650 kernel/printk/printk.c:2426 vprintk_default+0x26/0x30 kernel/printk/printk.c:2465 vprintk+0x1d/0x30 kernel/printk/printk_safe.c:82 _printk+0x79/0xa0 kernel/printk/printk.c:2475 set_capacity_and_notify+0x14c/0x1f0 block/genhd.c:93 loop_set_size+0x2e/0x70 drivers/block/loop.c:210 loop_configure+0x7ec/0x970 drivers/block/loop.c:1067 lo_ioctl+0x559/0x15d0 drivers/block/loop.c:-1 blkdev_ioctl+0x352/0x440 block/ioctl.c:704 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:906 [inline] __se_sys_ioctl+0xcb/0x140 fs/ioctl.c:892 __x64_sys_ioctl+0x43/0x50 fs/ioctl.c:892 x64_sys_call+0x19a8/0x2fb0 arch/x86/include/generated/asm/syscalls_64.h:17 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd0/0x1a0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffffffff86881320 of 16 bytes by task 14973 on cpu 0: desc_read kernel/printk/printk_ringbuffer.c:482 [inline] desc_read_finalized_seq kernel/printk/printk_ringbuffer.c:1874 [inline] prb_read kernel/printk/printk_ringbuffer.c:1922 [inline] _prb_read_valid+0x1bc/0x920 kernel/printk/printk_ringbuffer.c:2113 prb_read_valid+0x3c/0x60 kernel/printk/printk_ringbuffer.c:2185 printk_get_next_message+0xc8/0x510 kernel/printk/printk.c:3005 console_emit_next_record kernel/printk/printk.c:3092 [inline] console_flush_all+0x290/0x730 kernel/printk/printk.c:3226 __console_flush_and_unlock kernel/printk/printk.c:3285 [inline] console_unlock+0xa1/0x330 kernel/printk/printk.c:3325 vprintk_emit+0x388/0x650 kernel/printk/printk.c:2450 vprintk_default+0x26/0x30 kernel/printk/printk.c:2465 vprintk+0x1d/0x30 kernel/printk/printk_safe.c:82 _printk+0x79/0xa0 kernel/printk/printk.c:2475 set_capacity_and_notify+0x14c/0x1f0 block/genhd.c:93 loop_set_size+0x2e/0x70 drivers/block/loop.c:210 loop_configure+0x7ec/0x970 drivers/block/loop.c:1067 lo_ioctl+0x559/0x15d0 drivers/block/loop.c:-1 blkdev_ioctl+0x352/0x440 block/ioctl.c:704 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:906 [inline] __se_sys_ioctl+0xcb/0x140 fs/ioctl.c:892 __x64_sys_ioctl+0x43/0x50 fs/ioctl.c:892 x64_sys_call+0x19a8/0x2fb0 arch/x86/include/generated/asm/syscalls_64.h:17 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd0/0x1a0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 14973 Comm: syz-executor.3 Not tainted 6.15.0-rc6-syzkaller-00105-g088d13246a46 #0 PREEMPT(voluntary) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 ================================================================== /dev/loop3: Can't open blockdev syz-executor.3 (14973) used greatest stack depth: 10432 bytes left