batadv0: entered promiscuous mode ================================================================== BUG: KCSAN: data-race in data_alloc / prb_reserve write to 0xffffffff85c720e8 of 8 bytes by task 27159 on cpu 1: data_alloc+0x291/0x2c0 kernel/printk/printk_ringbuffer.c:1088 prb_reserve+0x897/0xbc0 kernel/printk/printk_ringbuffer.c:1555 vprintk_store+0x53e/0x800 kernel/printk/printk.c:2228 vprintk_emit+0xd0/0x5d0 kernel/printk/printk.c:2284 vprintk_default+0x26/0x30 kernel/printk/printk.c:2318 vprintk+0x71/0x80 kernel/printk/printk_safe.c:45 _printk+0x7a/0xa0 kernel/printk/printk.c:2328 __ext4_error_inode+0x2d5/0x400 fs/ext4/super.c:869 ext4_do_update_inode fs/ext4/inode.c:5082 [inline] ext4_mark_iloc_dirty+0x325/0xe10 fs/ext4/inode.c:5709 __ext4_mark_inode_dirty+0x314/0x440 fs/ext4/inode.c:5913 ext4_dirty_inode+0x91/0xb0 fs/ext4/inode.c:5942 __mark_inode_dirty+0x169/0x7d0 fs/fs-writeback.c:2452 mark_inode_dirty_sync include/linux/fs.h:2385 [inline] dquot_free_space include/linux/quotaops.h:380 [inline] dquot_free_block include/linux/quotaops.h:390 [inline] ext4_mb_clear_bb fs/ext4/mballoc.c:6512 [inline] ext4_free_blocks+0xe71/0x1350 fs/ext4/mballoc.c:6631 ext4_remove_blocks fs/ext4/extents.c:2521 [inline] ext4_ext_rm_leaf fs/ext4/extents.c:2686 [inline] ext4_ext_remove_space+0x1851/0x2a90 fs/ext4/extents.c:2934 ext4_ext_truncate+0xc4/0x140 fs/ext4/extents.c:4440 ext4_truncate+0x773/0xb10 fs/ext4/inode.c:4146 ext4_process_orphan+0x113/0x1c0 fs/ext4/orphan.c:339 ext4_orphan_cleanup+0x669/0x9b0 fs/ext4/orphan.c:474 __ext4_fill_super fs/ext4/super.c:5582 [inline] ext4_fill_super+0x3668/0x39b0 fs/ext4/super.c:5703 get_tree_bdev+0x250/0x2e0 fs/super.c:1619 ext4_get_tree+0x1c/0x20 fs/ext4/super.c:5735 vfs_get_tree+0x53/0x1d0 fs/super.c:1784 do_new_mount+0x227/0x690 fs/namespace.c:3352 path_mount+0x496/0xb30 fs/namespace.c:3679 do_mount fs/namespace.c:3692 [inline] __do_sys_mount fs/namespace.c:3898 [inline] __se_sys_mount+0x27f/0x2d0 fs/namespace.c:3875 __x64_sys_mount+0x67/0x80 fs/namespace.c:3875 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x1d0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x63/0x6b read to 0xffffffff85c720e8 of 8 bytes by task 27172 on cpu 0: desc_read kernel/printk/printk_ringbuffer.c:478 [inline] desc_push_tail kernel/printk/printk_ringbuffer.c:774 [inline] desc_reserve kernel/printk/printk_ringbuffer.c:920 [inline] prb_reserve+0x229/0xbc0 kernel/printk/printk_ringbuffer.c:1505 vprintk_store+0x53e/0x800 kernel/printk/printk.c:2228 vprintk_emit+0xd0/0x5d0 kernel/printk/printk.c:2284 vprintk_default+0x26/0x30 kernel/printk/printk.c:2318 vprintk+0x71/0x80 kernel/printk/printk_safe.c:45 _printk+0x7a/0xa0 kernel/printk/printk.c:2328 __netdev_printk+0x2dc/0x3f0 net/core/dev.c:11489 netdev_info+0x99/0xc0 net/core/dev.c:11536 __dev_set_promiscuity+0x189/0x370 net/core/dev.c:8439 dev_set_promiscuity+0x3b/0x90 net/core/dev.c:8477 hsr_del_port+0x101/0x140 net/hsr/hsr_slave.c:223 hsr_del_ports net/hsr/hsr_device.c:413 [inline] hsr_dev_finalize+0x3ff/0x4d0 net/hsr/hsr_device.c:624 hsr_newlink+0x426/0x470 net/hsr/hsr_netlink.c:102 rtnl_newlink_create net/core/rtnetlink.c:3518 [inline] __rtnl_newlink net/core/rtnetlink.c:3738 [inline] rtnl_newlink+0xef3/0x1670 net/core/rtnetlink.c:3751 rtnetlink_rcv_msg+0x80a/0x8c0 net/core/rtnetlink.c:6618 netlink_rcv_skb+0x126/0x220 net/netlink/af_netlink.c:2543 rtnetlink_rcv+0x1c/0x20 net/core/rtnetlink.c:6636 netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline] netlink_unicast+0x589/0x660 net/netlink/af_netlink.c:1367 netlink_sendmsg+0x66e/0x770 net/netlink/af_netlink.c:1908 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg net/socket.c:745 [inline] ____sys_sendmsg+0x37c/0x4d0 net/socket.c:2584 ___sys_sendmsg net/socket.c:2638 [inline] __sys_sendmsg+0x1e9/0x270 net/socket.c:2667 __do_sys_sendmsg net/socket.c:2676 [inline] __se_sys_sendmsg net/socket.c:2674 [inline] __x64_sys_sendmsg+0x46/0x50 net/socket.c:2674 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x1d0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x63/0x6b value changed: 0x0000000000f248b0 -> 0x0000000000fe93d8 Reported by Kernel Concurrency Sanitizer on: CPU: 0 PID: 27172 Comm: syz-executor.0 Not tainted 6.8.0-rc4-syzkaller-00388-gced590523156 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 ================================================================== batadv0: left promiscuous mode syz-executor.0 (27172) used greatest stack depth: 9080 bytes left