dump_stack_lvl+0xe8/0x140 lib/dump_stack.c:120 dump_stack+0x15/0x1b lib/dump_stack.c:129 fail_dump lib/fault-inject.c:73 [inline] should_fail_ex+0x265/0x280 lib/fault-inject.c:174 ================================================================== BUG: KCSAN: data-race in data_alloc / prb_reserve write to 0xffffffff868783f8 of 8 bytes by task 14699 on cpu 1: data_alloc+0x27d/0x2b0 kernel/printk/printk_ringbuffer.c:1096 prb_reserve+0x808/0xaf0 kernel/printk/printk_ringbuffer.c:1669 vprintk_store+0x56d/0x860 kernel/printk/printk.c:2326 vprintk_emit+0x178/0x650 kernel/printk/printk.c:2426 vprintk_default+0x26/0x30 kernel/printk/printk.c:2465 vprintk+0x1d/0x30 kernel/printk/printk_safe.c:82 _printk+0x79/0xa0 kernel/printk/printk.c:2475 __ext4_msg+0x18f/0x1a0 fs/ext4/super.c:985 ext4_check_feature_compatibility+0x54f/0x5f0 fs/ext4/super.c:-1 __ext4_fill_super fs/ext4/super.c:5325 [inline] ext4_fill_super+0x1ade/0x34e0 fs/ext4/super.c:5726 get_tree_bdev_flags+0x28e/0x300 fs/super.c:1636 get_tree_bdev+0x1f/0x30 fs/super.c:1659 ext4_get_tree+0x1c/0x30 fs/ext4/super.c:5758 vfs_get_tree+0x54/0x1d0 fs/super.c:1759 do_new_mount+0x207/0x680 fs/namespace.c:3884 path_mount+0x4a4/0xb20 fs/namespace.c:4211 do_mount fs/namespace.c:4224 [inline] __do_sys_mount fs/namespace.c:4435 [inline] __se_sys_mount+0x28f/0x2e0 fs/namespace.c:4412 __x64_sys_mount+0x67/0x80 fs/namespace.c:4412 x64_sys_call+0xd36/0x2fb0 arch/x86/include/generated/asm/syscalls_64.h:166 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd0/0x1a0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffffffff868783f8 of 8 bytes by task 14698 on cpu 0: desc_read kernel/printk/printk_ringbuffer.c:482 [inline] desc_push_tail kernel/printk/printk_ringbuffer.c:778 [inline] desc_reserve kernel/printk/printk_ringbuffer.c:924 [inline] prb_reserve+0x221/0xaf0 kernel/printk/printk_ringbuffer.c:1619 vprintk_store+0x56d/0x860 kernel/printk/printk.c:2326 vprintk_emit+0x178/0x650 kernel/printk/printk.c:2426 vprintk_default+0x26/0x30 kernel/printk/printk.c:2465 vprintk+0x1d/0x30 kernel/printk/printk_safe.c:82 _printk+0x79/0xa0 kernel/printk/printk.c:2475 printk_stack_address arch/x86/kernel/dumpstack.c:72 [inline] show_trace_log_lvl+0x4e3/0x560 arch/x86/kernel/dumpstack.c:284 __dump_stack+0x1d/0x30 lib/dump_stack.c:94 dump_stack_lvl+0xe8/0x140 lib/dump_stack.c:120 dump_stack+0x15/0x1b lib/dump_stack.c:129 fail_dump lib/fault-inject.c:73 [inline] should_fail_ex+0x265/0x280 lib/fault-inject.c:174 should_failslab+0x8c/0xb0 mm/failslab.c:46 slab_pre_alloc_hook mm/slub.c:4114 [inline] slab_alloc_node mm/slub.c:4190 [inline] __kmalloc_cache_noprof+0x4c/0x320 mm/slub.c:4367 kmalloc_noprof include/linux/slab.h:905 [inline] audit_log_d_path+0x8d/0x150 kernel/audit.c:2149 audit_log_d_path_exe+0x42/0x70 kernel/audit.c:2219 audit_log_task+0x1e9/0x250 kernel/auditsc.c:2957 audit_seccomp+0x61/0x100 kernel/auditsc.c:3004 seccomp_log kernel/seccomp.c:1033 [inline] __seccomp_filter+0x69d/0x10d0 kernel/seccomp.c:1328 __secure_computing+0x82/0x150 kernel/seccomp.c:1388 syscall_trace_enter+0xcf/0x1e0 kernel/entry/common.c:52 syscall_enter_from_user_mode_work include/linux/entry-common.h:169 [inline] syscall_enter_from_user_mode include/linux/entry-common.h:199 [inline] do_syscall_64+0xaa/0x1a0 arch/x86/entry/syscall_64.c:90 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0xffffffffffff4580 -> 0x0000000000096ce0 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 14698 Comm: syz.3.4069 Tainted: G W 6.15.0-rc4-syzkaller-00052-g4f79eaa2ceac #0 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 ================================================================== should_failslab+0x8c/0xb0 mm/failslab.c:46 slab_pre_alloc_hook mm/slub.c:4114 [inline] slab_alloc_node mm/slub.c:4190 [inline] __kmalloc_cache_noprof+0x4c/0x320 mm/slub.c:4367 kmalloc_noprof include/linux/slab.h:905 [inline] audit_log_d_path+0x8d/0x150 kernel/audit.c:2149 audit_log_d_path_exe+0x42/0x70 kernel/audit.c:2219 audit_log_task+0x1e9/0x250 kernel/auditsc.c:2957 audit_seccomp+0x61/0x100 kernel/auditsc.c:3004 seccomp_log kernel/seccomp.c:1033 [inline] __seccomp_filter+0x69d/0x10d0 kernel/seccomp.c:1328 __secure_computing+0x82/0x150 kernel/seccomp.c:1388 syscall_trace_enter+0xcf/0x1e0 kernel/entry/common.c:52 syscall_enter_from_user_mode_work include/linux/entry-common.h:169 [inline] syscall_enter_from_user_mode include/linux/entry-common.h:199 [inline] do_syscall_64+0xaa/0x1a0 arch/x86/entry/syscall_64.c:90 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f0f5fd1e969 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f0f5e387038 EFLAGS: 00000246 ORIG_RAX: 0000000000000061 RAX: ffffffffffffffda RBX: 00007f0f5ff45fa0 RCX: 00007f0f5fd1e969 RDX: 0000000000000000 RSI: 0000200000000180 RDI: 000000000000000c RBP: 00007f0f5e387090 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 R13: 0000000000000000 R14: 00007f0f5ff45fa0 R15: 00007ffc41680ff8