veth0_macvtap: entered promiscuous mode veth1_macvtap: entered promiscuous mode ================================================================== BUG: KCSAN: data-race in data_push_tail / vsnprintf write to 0xffffffff88eaba52 of 9 bytes by task 15205 on cpu 1: vsnprintf+0x2ce/0x860 lib/vsprintf.c:2898 vscnprintf+0x41/0x90 lib/vsprintf.c:3012 printk_sprint+0x30/0x2d0 kernel/printk/printk.c:2192 vprintk_store+0x568/0x830 kernel/printk/printk.c:2312 vprintk_emit+0x15a/0x5c0 kernel/printk/printk.c:2402 vprintk_default+0x26/0x30 kernel/printk/printk.c:2441 vprintk+0x1d/0x30 kernel/printk/printk_safe.c:82 _printk+0x79/0xa0 kernel/printk/printk.c:2451 __ext4_msg+0x135/0x1a0 fs/ext4/super.c:992 ext4_check_opt_consistency+0xaa8/0xb10 fs/ext4/super.c:-1 __ext4_fill_super fs/ext4/super.c:5350 [inline] ext4_fill_super+0x1b06/0x37a0 fs/ext4/super.c:5777 get_tree_bdev_flags+0x291/0x300 fs/super.c:1691 get_tree_bdev+0x1f/0x30 fs/super.c:1714 ext4_get_tree+0x1c/0x30 fs/ext4/super.c:5809 vfs_get_tree+0x57/0x1d0 fs/super.c:1751 fc_mount fs/namespace.c:1199 [inline] do_new_mount_fc fs/namespace.c:3636 [inline] do_new_mount+0x24d/0x6a0 fs/namespace.c:3712 path_mount+0x4ab/0xb80 fs/namespace.c:4022 do_mount fs/namespace.c:4035 [inline] __do_sys_mount fs/namespace.c:4224 [inline] __se_sys_mount+0x28c/0x2e0 fs/namespace.c:4201 __x64_sys_mount+0x67/0x80 fs/namespace.c:4201 x64_sys_call+0x2cca/0x3000 arch/x86/include/generated/asm/syscalls_64.h:166 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xca/0x2b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffffffff88eaba58 of 8 bytes by task 14917 on cpu 0: data_make_reusable kernel/printk/printk_ringbuffer.c:608 [inline] data_push_tail+0x100/0x470 kernel/printk/printk_ringbuffer.c:693 data_alloc+0x11b/0x390 kernel/printk/printk_ringbuffer.c:1089 prb_reserve+0x8d7/0xad0 kernel/printk/printk_ringbuffer.c:1724 vprintk_store+0x53c/0x830 kernel/printk/printk.c:2302 vprintk_emit+0x15a/0x5c0 kernel/printk/printk.c:2402 vprintk_default+0x26/0x30 kernel/printk/printk.c:2441 vprintk+0x1d/0x30 kernel/printk/printk_safe.c:82 _printk+0x79/0xa0 kernel/printk/printk.c:2451 __netdev_printk+0x310/0x370 net/core/dev.c:12911 netdev_info+0x9b/0xd0 net/core/dev.c:12958 __dev_set_promiscuity+0x1fb/0x3f0 net/core/dev.c:9548 __dev_set_rx_mode+0x113/0x160 net/core/dev.c:-1 dev_uc_add+0x8d/0xb0 net/core/dev_addr_lists.c:693 macsec_dev_open+0x61/0x480 drivers/net/macsec.c:3557 __dev_open+0x317/0x560 net/core/dev.c:1683 __dev_change_flags+0x147/0x3c0 net/core/dev.c:9736 netif_change_flags+0x5a/0xd0 net/core/dev.c:9799 do_setlink+0x8db/0x2780 net/core/rtnetlink.c:3158 rtnl_changelink net/core/rtnetlink.c:3776 [inline] __rtnl_newlink net/core/rtnetlink.c:3935 [inline] rtnl_newlink+0xea4/0x1360 net/core/rtnetlink.c:4072 rtnetlink_rcv_msg+0x5fe/0x6d0 net/core/rtnetlink.c:6958 netlink_rcv_skb+0x123/0x220 net/netlink/af_netlink.c:2550 rtnetlink_rcv+0x1c/0x30 net/core/rtnetlink.c:6985 netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline] netlink_unicast+0x5c0/0x690 net/netlink/af_netlink.c:1344 netlink_sendmsg+0x58b/0x6b0 net/netlink/af_netlink.c:1894 sock_sendmsg_nosec net/socket.c:727 [inline] __sock_sendmsg+0x145/0x180 net/socket.c:742 __sys_sendto+0x268/0x330 net/socket.c:2206 __do_sys_sendto net/socket.c:2213 [inline] __se_sys_sendto net/socket.c:2209 [inline] __x64_sys_sendto+0x76/0x90 net/socket.c:2209 x64_sys_call+0x29a7/0x3000 arch/x86/include/generated/asm/syscalls_64.h:45 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xca/0x2b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x00000000fffffcf7 -> 0x646e6120646c6f20 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 14917 Comm: syz-executor Tainted: G W syzkaller #0 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 ================================================================== batman_adv: batadv0: Interface activated: batadv_slave_0 batman_adv: batadv0: Interface activated: batadv_slave_1