BUG: KCSAN: data-race in data_alloc / data_push_tail write to 0xffffffff88e1d5f8 of 8 bytes by task 10316 on cpu 0: data_alloc+0x203/0x2b0 kernel/printk/printk_ringbuffer.c:1082 prb_reserve+0x808/0xaf0 kernel/printk/printk_ringbuffer.c:1669 vprintk_store+0x56d/0x860 kernel/printk/printk.c:2326 vprintk_emit+0x178/0x650 kernel/printk/printk.c:2426 vprintk_default+0x26/0x30 kernel/printk/printk.c:2465 vprintk+0x1d/0x30 kernel/printk/printk_safe.c:82 _printk+0x79/0xa0 kernel/printk/printk.c:2475 printk_stack_address arch/x86/kernel/dumpstack.c:72 [inline] show_trace_log_lvl+0x4e3/0x560 arch/x86/kernel/dumpstack.c:284 __dump_stack+0x1d/0x30 lib/dump_stack.c:94 dump_stack_lvl+0xe8/0x140 lib/dump_stack.c:120 dump_stack+0x15/0x1b lib/dump_stack.c:129 fail_dump lib/fault-inject.c:73 [inline] should_fail_ex+0x265/0x280 lib/fault-inject.c:174 should_failslab+0x8c/0xb0 mm/failslab.c:46 slab_pre_alloc_hook mm/slub.c:4114 [inline] slab_alloc_node mm/slub.c:4190 [inline] __do_kmalloc_node mm/slub.c:4340 [inline] __kmalloc_node_track_caller_noprof+0xa4/0x410 mm/slub.c:4360 kmemdup_noprof+0x2b/0x70 mm/util.c:137 _Z14kmemdup_noprofPKvU25pass_dynamic_object_size0mj include/linux/fortify-string.h:765 [inline] sidtab_sid2str_get+0xa0/0x130 security/selinux/ss/sidtab.c:625 sidtab_entry_to_string security/selinux/ss/services.c:1296 [inline] security_sid_to_context_core+0x1eb/0x2e0 security/selinux/ss/services.c:1399 security_sid_to_context+0x27/0x40 security/selinux/ss/services.c:1420 selinux_secid_to_secctx security/selinux/hooks.c:6695 [inline] selinux_lsmprop_to_secctx+0x67/0xf0 security/selinux/hooks.c:6709 security_lsmprop_to_secctx+0x43/0x80 security/security.c:4343 audit_log_task_context+0x77/0x190 kernel/audit.c:2190 audit_log_task+0xf4/0x250 kernel/auditsc.c:2954 audit_seccomp+0x61/0x100 kernel/auditsc.c:3004 seccomp_log kernel/seccomp.c:1033 [inline] __seccomp_filter+0x69d/0x10d0 kernel/seccomp.c:1328 __secure_computing+0x82/0x150 kernel/seccomp.c:1388 syscall_trace_enter+0xcf/0x1e0 kernel/entry/common.c:52 syscall_enter_from_user_mode_work include/linux/entry-common.h:169 [inline] syscall_enter_from_user_mode include/linux/entry-common.h:199 [inline] do_syscall_64+0xaa/0x1a0 arch/x86/entry/syscall_64.c:90 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffffffff88e1d5f8 of 8 bytes by task 10305 on cpu 1: data_make_reusable kernel/printk/printk_ringbuffer.c:594 [inline] data_push_tail+0xfd/0x420 kernel/printk/printk_ringbuffer.c:679 data_alloc+0xbf/0x2b0 kernel/printk/printk_ringbuffer.c:1054 prb_reserve+0x808/0xaf0 kernel/printk/printk_ringbuffer.c:1669 vprintk_store+0x56d/0x860 kernel/printk/printk.c:2326 vprintk_emit+0x178/0x650 kernel/printk/printk.c:2426 vprintk_default+0x26/0x30 kernel/printk/printk.c:2465 vprintk+0x1d/0x30 kernel/printk/printk_safe.c:82 _printk+0x79/0xa0 kernel/printk/printk.c:2475 __ext4_msg+0x18f/0x1a0 fs/ext4/super.c:985 ext4_fill_super+0x2d05/0x34e0 fs/ext4/super.c:5741 get_tree_bdev_flags+0x28e/0x300 fs/super.c:1636 get_tree_bdev+0x1f/0x30 fs/super.c:1659 ext4_get_tree+0x1c/0x30 fs/ext4/super.c:5758 vfs_get_tree+0x54/0x1d0 fs/super.c:1759 do_new_mount+0x207/0x680 fs/namespace.c:3884 path_mount+0x4a4/0xb20 fs/namespace.c:4211 do_mount fs/namespace.c:4224 [inline] __do_sys_mount fs/namespace.c:4435 [inline] __se_sys_mount+0x28f/0x2e0 fs/namespace.c:4412 __x64_sys_mount+0x67/0x80 fs/namespace.c:4412 x64_sys_call+0xd36/0x2fb0 arch/x86/include/generated/asm/syscalls_64.h:166 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd0/0x1a0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x00000000fffff0b6 -> 0x00000000fffffcda Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 10305 Comm: syz.6.2323 Not tainted 6.15.0-rc4-syzkaller-00051-g7a13c14ee59d #0 PREEMPT(voluntary) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 ================================================================== ext4 filesystem being mounted at /383/file0 supports timestamps until 2038-01-19 (0x7fffffff)