8021q: adding VLAN 0 to HW filter on device team177 ================================================================== BUG: KCSAN: data-race in data_push_tail / string write to 0xffffffff86ed4033 of 1 bytes by task 29465 on cpu 1: string_nocheck lib/vsprintf.c:650 [inline] string+0x16c/0x200 lib/vsprintf.c:728 vsnprintf+0xa09/0xe20 lib/vsprintf.c:2824 vscnprintf+0x42/0x80 lib/vsprintf.c:2930 printk_sprint+0x30/0x2d0 kernel/printk/printk.c:2124 vprintk_store+0x56f/0x800 kernel/printk/printk.c:2238 vprintk_emit+0xd0/0x5d0 kernel/printk/printk.c:2284 vprintk_default+0x26/0x30 kernel/printk/printk.c:2318 vprintk+0x71/0x80 kernel/printk/printk_safe.c:45 _printk+0x7a/0xa0 kernel/printk/printk.c:2328 __ext4_msg+0x18a/0x1a0 fs/ext4/super.c:1006 ext4_fill_super+0x1a1f/0x39a0 fs/ext4/super.c:5727 get_tree_bdev+0x272/0x300 fs/super.c:1598 ext4_get_tree+0x1c/0x20 fs/ext4/super.c:5744 vfs_get_tree+0x51/0x1b0 fs/super.c:1771 do_new_mount+0x203/0x660 fs/namespace.c:3337 path_mount+0x496/0xb30 fs/namespace.c:3664 do_mount fs/namespace.c:3677 [inline] __do_sys_mount fs/namespace.c:3886 [inline] __se_sys_mount+0x27f/0x2d0 fs/namespace.c:3863 __x64_sys_mount+0x67/0x80 fs/namespace.c:3863 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x44/0x110 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x63/0x6b read to 0xffffffff86ed4030 of 8 bytes by task 29481 on cpu 0: data_make_reusable kernel/printk/printk_ringbuffer.c:590 [inline] data_push_tail+0x102/0x430 kernel/printk/printk_ringbuffer.c:675 data_alloc+0xbe/0x2c0 kernel/printk/printk_ringbuffer.c:1046 prb_reserve+0x893/0xbc0 kernel/printk/printk_ringbuffer.c:1555 vprintk_store+0x53e/0x800 kernel/printk/printk.c:2228 vprintk_emit+0xd0/0x5d0 kernel/printk/printk.c:2284 vprintk_default+0x26/0x30 kernel/printk/printk.c:2318 vprintk+0x71/0x80 kernel/printk/printk_safe.c:45 _printk+0x7a/0xa0 kernel/printk/printk.c:2328 vlan_device_event+0x106a/0x1120 net/8021q/vlan.c:383 notifier_call_chain kernel/notifier.c:93 [inline] raw_notifier_call_chain+0x6b/0x1c0 kernel/notifier.c:461 __dev_notify_flags+0x205/0x3d0 rtnl_newlink_create net/core/rtnetlink.c:3529 [inline] __rtnl_newlink net/core/rtnetlink.c:3741 [inline] rtnl_newlink+0x12cc/0x1670 net/core/rtnetlink.c:3754 rtnetlink_rcv_msg+0x807/0x8c0 net/core/rtnetlink.c:6558 netlink_rcv_skb+0x126/0x220 net/netlink/af_netlink.c:2545 rtnetlink_rcv+0x1c/0x20 net/core/rtnetlink.c:6576 netlink_unicast_kernel net/netlink/af_netlink.c:1342 [inline] netlink_unicast+0x589/0x650 net/netlink/af_netlink.c:1368 netlink_sendmsg+0x66e/0x770 net/netlink/af_netlink.c:1910 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg net/socket.c:745 [inline] ____sys_sendmsg+0x37c/0x4d0 net/socket.c:2584 ___sys_sendmsg net/socket.c:2638 [inline] __sys_sendmsg+0x1e9/0x270 net/socket.c:2667 __do_sys_sendmsg net/socket.c:2676 [inline] __se_sys_sendmsg net/socket.c:2674 [inline] __x64_sys_sendmsg+0x46/0x50 net/socket.c:2674 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x44/0x110 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x63/0x6b value changed: 0x0000000100013b9d -> 0x3a2930706f6f6c28 Reported by Kernel Concurrency Sanitizer on: CPU: 0 PID: 29481 Comm: syz-executor.3 Not tainted 6.7.0-rc7-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 ================================================================== syz-executor.3 (29481) used greatest stack depth: 9072 bytes left