veth0_vlan: entered promiscuous mode ================================================================== BUG: KCSAN: data-race in data_push_tail / vsnprintf write to 0xffffffff8910c442 of 8 bytes by task 6067 on cpu 1: vsnprintf+0x2ce/0x860 lib/vsprintf.c:2898 vscnprintf+0x41/0x90 lib/vsprintf.c:3012 printk_sprint+0x30/0x2c0 kernel/printk/printk.c:2192 vprintk_store+0x57b/0x910 kernel/printk/printk.c:2312 vprintk_emit+0x1a4/0x600 kernel/printk/printk.c:2402 vprintk_default+0x26/0x30 kernel/printk/printk.c:2441 vprintk+0x1d/0x30 kernel/printk/printk_safe.c:82 _printk+0x79/0xa0 kernel/printk/printk.c:2451 _fat_msg+0xb0/0xe0 fs/fat/misc.c:62 fat__get_entry fs/fat/dir.c:102 [inline] fat_get_entry+0x52b/0x5d0 fs/fat/dir.c:128 fat_get_short_entry fs/fat/dir.c:885 [inline] fat_subdirs+0xf6/0x190 fs/fat/dir.c:951 fat_read_root+0x316/0x360 fs/fat/inode.c:1348 fat_fill_super+0x15c1/0x1ce0 fs/fat/inode.c:1821 vfat_fill_super+0x24/0x30 fs/fat/namei_vfat.c:1197 get_tree_bdev_flags+0x291/0x300 fs/super.c:1691 get_tree_bdev+0x1f/0x30 fs/super.c:1714 vfat_get_tree+0x1c/0x30 fs/fat/namei_vfat.c:1202 vfs_get_tree+0x57/0x1d0 fs/super.c:1751 fc_mount fs/namespace.c:1199 [inline] do_new_mount_fc fs/namespace.c:3636 [inline] do_new_mount+0x288/0x700 fs/namespace.c:3712 path_mount+0x4d0/0xbc0 fs/namespace.c:4022 do_mount fs/namespace.c:4035 [inline] __do_sys_mount fs/namespace.c:4224 [inline] __se_sys_mount+0x28c/0x2e0 fs/namespace.c:4201 __x64_sys_mount+0x67/0x80 fs/namespace.c:4201 x64_sys_call+0x2cca/0x3000 arch/x86/include/generated/asm/syscalls_64.h:166 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xc0/0x2a0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffffffff8910c448 of 8 bytes by task 5740 on cpu 0: data_make_reusable kernel/printk/printk_ringbuffer.c:608 [inline] data_push_tail+0x100/0x470 kernel/printk/printk_ringbuffer.c:693 data_alloc+0x11b/0x390 kernel/printk/printk_ringbuffer.c:1089 prb_reserve+0x8d7/0xae0 kernel/printk/printk_ringbuffer.c:1724 vprintk_store+0x54a/0x910 kernel/printk/printk.c:2302 vprintk_emit+0x1a4/0x600 kernel/printk/printk.c:2402 vprintk_default+0x26/0x30 kernel/printk/printk.c:2441 vprintk+0x1d/0x30 kernel/printk/printk_safe.c:82 _printk+0x79/0xa0 kernel/printk/printk.c:2451 __netdev_printk+0x310/0x370 net/core/dev.c:12924 netdev_info+0xa6/0xd0 net/core/dev.c:12971 __dev_set_promiscuity+0x1fb/0x3f0 net/core/dev.c:9561 __dev_set_rx_mode+0x113/0x160 net/core/dev.c:-1 dev_uc_add+0x8d/0xb0 net/core/dev_addr_lists.c:693 vlan_dev_set_mac_address+0x123/0x200 net/8021q/vlan_dev.c:324 netif_set_mac_address+0x162/0x2c0 net/core/dev.c:9985 do_setlink+0x5f9/0x2940 net/core/rtnetlink.c:3110 rtnl_changelink net/core/rtnetlink.c:3776 [inline] __rtnl_newlink net/core/rtnetlink.c:3935 [inline] rtnl_newlink+0xea4/0x1370 net/core/rtnetlink.c:4072 rtnetlink_rcv_msg+0x64b/0x720 net/core/rtnetlink.c:6958 netlink_rcv_skb+0x123/0x220 net/netlink/af_netlink.c:2550 rtnetlink_rcv+0x1c/0x30 net/core/rtnetlink.c:6985 netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline] netlink_unicast+0x5c0/0x690 net/netlink/af_netlink.c:1344 netlink_sendmsg+0x5c8/0x6f0 net/netlink/af_netlink.c:1894 sock_sendmsg_nosec net/socket.c:727 [inline] __sock_sendmsg net/socket.c:742 [inline] __sys_sendto+0x470/0x4d0 net/socket.c:2206 __do_sys_sendto net/socket.c:2213 [inline] __se_sys_sendto net/socket.c:2209 [inline] __x64_sys_sendto+0x76/0x90 net/socket.c:2209 x64_sys_call+0x29a7/0x3000 arch/x86/include/generated/asm/syscalls_64.h:45 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xc0/0x2a0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x00000000ffffe0f6 -> 0x203a2937706f6f6c Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 5740 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(voluntary) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 ================================================================== veth1_vlan: entered promiscuous mode veth0_macvtap: entered promiscuous mode veth1_macvtap: entered promiscuous mode batman_adv: batadv0: Interface activated: batadv_slave_0 batman_adv: batadv0: Interface activated: batadv_slave_1