loop0: detected capacity change from 0 to 264192 SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 ================================================================== BUG: KCSAN: data-race in data_push_tail / string write to 0xffffffff8707dc82 of 1 bytes by task 19301 on cpu 0: string_nocheck lib/vsprintf.c:647 [inline] string+0x17b/0x220 lib/vsprintf.c:725 vsnprintf+0xb57/0xe80 lib/vsprintf.c:2782 va_format lib/vsprintf.c:1680 [inline] pointer+0x685/0x910 lib/vsprintf.c:2419 vsnprintf+0x905/0xe80 lib/vsprintf.c:2786 vscnprintf+0x3e/0x80 lib/vsprintf.c:2888 printk_sprint kernel/printk/printk.c:2092 [inline] vprintk_store+0x5f2/0xb50 kernel/printk/printk.c:2206 vprintk_emit+0xcc/0x430 kernel/printk/printk.c:2252 vprintk_default+0x22/0x30 kernel/printk/printk.c:2282 vprintk+0x7f/0x90 kernel/printk/printk_safe.c:50 _printk+0x76/0x96 kernel/printk/printk.c:2292 logfc+0x2bb/0x2d0 vfs_parse_fs_param+0x1cf/0x290 fs/fs_context.c:158 vfs_parse_fs_string fs/fs_context.c:184 [inline] generic_parse_monolithic+0x16d/0x1d0 fs/fs_context.c:224 nfs_fs_context_parse_monolithic+0x4aa/0x1190 parse_monolithic_mount_data+0x3e/0x50 fs/fs_context.c:667 do_new_mount+0x1d3/0x650 fs/namespace.c:3036 path_mount+0x4ad/0xbb0 fs/namespace.c:3370 do_mount fs/namespace.c:3383 [inline] __do_sys_mount fs/namespace.c:3591 [inline] __se_sys_mount+0x281/0x2d0 fs/namespace.c:3568 __x64_sys_mount+0x63/0x70 fs/namespace.c:3568 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd read to 0xffffffff8707dc80 of 8 bytes by task 19295 on cpu 1: data_make_reusable kernel/printk/printk_ringbuffer.c:590 [inline] data_push_tail+0x10f/0x440 kernel/printk/printk_ringbuffer.c:675 data_alloc+0xbc/0x2b0 kernel/printk/printk_ringbuffer.c:1046 prb_reserve+0x897/0xbd0 kernel/printk/printk_ringbuffer.c:1555 vprintk_store+0x51c/0xb50 kernel/printk/printk.c:2196 vprintk_emit+0xcc/0x430 kernel/printk/printk.c:2252 vprintk_default+0x22/0x30 kernel/printk/printk.c:2282 vprintk+0x7f/0x90 kernel/printk/printk_safe.c:50 _printk+0x76/0x96 kernel/printk/printk.c:2292 selinux_add_opt+0x235/0x280 security/selinux/hooks.c:1002 selinux_sb_eat_lsm_opts+0x727/0x7e0 security/selinux/hooks.c:2600 security_sb_eat_lsm_opts+0x42/0x90 security/security.c:941 generic_parse_monolithic+0x44/0x1d0 fs/fs_context.c:209 nfs_fs_context_parse_monolithic+0x4aa/0x1190 parse_monolithic_mount_data+0x3e/0x50 fs/fs_context.c:667 do_new_mount+0x1d3/0x650 fs/namespace.c:3036 path_mount+0x4ad/0xbb0 fs/namespace.c:3370 do_mount fs/namespace.c:3383 [inline] __do_sys_mount fs/namespace.c:3591 [inline] __se_sys_mount+0x281/0x2d0 fs/namespace.c:3568 __x64_sys_mount+0x63/0x70 fs/namespace.c:3568 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd value changed: 0x00000000ffffe1b5 -> 0x6b6e55203a73666e Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 19295 Comm: syz-executor.0 Not tainted 6.0.0-rc5-syzkaller-00094-ga335366bad13-dirty #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022 ==================================================================