EXT4-fs (loop0): revision level too high, forcing read-only mode ================================================================== BUG: KCSAN: data-race in data_push_tail / vsnprintf write to 0xffffffff86ed74a0 of 1 bytes by task 4895 on cpu 1: vsnprintf+0xdd0/0xe20 va_format lib/vsprintf.c:1682 [inline] pointer+0x8a1/0xd10 lib/vsprintf.c:2449 vsnprintf+0x861/0xe20 lib/vsprintf.c:2822 vscnprintf+0x42/0x80 lib/vsprintf.c:2924 printk_sprint+0x30/0x2d0 kernel/printk/printk.c:2128 vprintk_store+0x56f/0x800 kernel/printk/printk.c:2242 vprintk_emit+0xd0/0x5d0 kernel/printk/printk.c:2288 vprintk_default+0x26/0x30 kernel/printk/printk.c:2322 vprintk+0x71/0x80 kernel/printk/printk_safe.c:45 _printk+0x7a/0xa0 kernel/printk/printk.c:2332 __ext4_msg+0x18a/0x1a0 fs/ext4/super.c:998 ext4_orphan_cleanup+0x8ec/0x9b0 fs/ext4/orphan.c:497 __ext4_fill_super fs/ext4/super.c:5582 [inline] ext4_fill_super+0x35fa/0x3940 fs/ext4/super.c:5703 get_tree_bdev+0x272/0x300 fs/super.c:1577 ext4_get_tree+0x1c/0x20 fs/ext4/super.c:5735 vfs_get_tree+0x51/0x1b0 fs/super.c:1750 do_new_mount+0x203/0x660 fs/namespace.c:3335 path_mount+0x496/0xb30 fs/namespace.c:3662 do_mount fs/namespace.c:3675 [inline] __do_sys_mount fs/namespace.c:3884 [inline] __se_sys_mount+0x27f/0x2d0 fs/namespace.c:3861 __x64_sys_mount+0x67/0x80 fs/namespace.c:3861 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd read to 0xffffffff86ed74a0 of 8 bytes by task 4905 on cpu 0: data_make_reusable kernel/printk/printk_ringbuffer.c:590 [inline] data_push_tail+0x102/0x430 kernel/printk/printk_ringbuffer.c:675 data_alloc+0xbe/0x2c0 kernel/printk/printk_ringbuffer.c:1046 prb_reserve+0x893/0xbc0 kernel/printk/printk_ringbuffer.c:1555 vprintk_store+0x53e/0x800 kernel/printk/printk.c:2232 vprintk_emit+0xd0/0x5d0 kernel/printk/printk.c:2288 vprintk_default+0x26/0x30 kernel/printk/printk.c:2322 vprintk+0x71/0x80 kernel/printk/printk_safe.c:45 _printk+0x7a/0xa0 kernel/printk/printk.c:2332 __ext4_msg+0x18a/0x1a0 fs/ext4/super.c:998 ext4_setup_super+0x71/0x560 fs/ext4/super.c:3092 __ext4_fill_super fs/ext4/super.c:5494 [inline] ext4_fill_super+0x2feb/0x3940 fs/ext4/super.c:5703 get_tree_bdev+0x272/0x300 fs/super.c:1577 ext4_get_tree+0x1c/0x20 fs/ext4/super.c:5735 vfs_get_tree+0x51/0x1b0 fs/super.c:1750 do_new_mount+0x203/0x660 fs/namespace.c:3335 path_mount+0x496/0xb30 fs/namespace.c:3662 do_mount fs/namespace.c:3675 [inline] __do_sys_mount fs/namespace.c:3884 [inline] __se_sys_mount+0x27f/0x2d0 fs/namespace.c:3861 __x64_sys_mount+0x67/0x80 fs/namespace.c:3861 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd value changed: 0x000000010000ca44 -> 0x000000010000000a Reported by Kernel Concurrency Sanitizer on: CPU: 0 PID: 4905 Comm: syz-executor.0 Not tainted 6.6.0-rc5-syzkaller-00338-gfbe1bf1e5ff1 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 ==================================================================