x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING ================================================================== BUG: KCSAN: data-race in console_flush_all / console_flush_all write to 0xffffffff86a20878 of 8 bytes by task 6056 on cpu 0: console_emit_next_record kernel/printk/printk.c:3099 [inline] console_flush_all+0x35a/0x730 kernel/printk/printk.c:3226 __console_flush_and_unlock kernel/printk/printk.c:3285 [inline] console_unlock+0xa1/0x330 kernel/printk/printk.c:3325 vprintk_emit+0x388/0x650 kernel/printk/printk.c:2450 dev_vprintk_emit+0x242/0x2a0 drivers/base/core.c:4914 dev_printk_emit+0x84/0xb0 drivers/base/core.c:4925 __dev_printk+0xf3/0x110 drivers/base/core.c:4937 _dev_printk+0x96/0xc0 drivers/base/core.c:4954 proc_do_submiturb+0x1a95/0x1d20 drivers/usb/core/devio.c:1975 proc_submiturb+0x7b/0xa0 drivers/usb/core/devio.c:2003 usbdev_do_ioctl drivers/usb/core/devio.c:2703 [inline] usbdev_ioctl+0xcc2/0x1710 drivers/usb/core/devio.c:2827 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:598 [inline] __se_sys_ioctl+0xce/0x140 fs/ioctl.c:584 __x64_sys_ioctl+0x43/0x50 fs/ioctl.c:584 x64_sys_call+0x1816/0x2ff0 arch/x86/include/generated/asm/syscalls_64.h:17 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd2/0x200 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffffffff86a20878 of 8 bytes by task 6050 on cpu 1: console_flush_all+0x563/0x730 kernel/printk/printk.c:3227 __console_flush_and_unlock kernel/printk/printk.c:3285 [inline] console_unlock+0xa1/0x330 kernel/printk/printk.c:3325 vprintk_emit+0x388/0x650 kernel/printk/printk.c:2450 vprintk_default+0x26/0x30 kernel/printk/printk.c:2465 vprintk+0x1d/0x30 kernel/printk/printk_safe.c:82 _printk+0x79/0xa0 kernel/printk/printk.c:2475 xt_check_target+0x461/0x4c0 net/netfilter/x_tables.c:-1 check_target net/ipv6/netfilter/ip6_tables.c:528 [inline] find_check_entry net/ipv6/netfilter/ip6_tables.c:571 [inline] translate_table+0xcf5/0x1070 net/ipv6/netfilter/ip6_tables.c:733 do_replace net/ipv6/netfilter/ip6_tables.c:1154 [inline] do_ip6t_set_ctl+0x678/0x840 net/ipv6/netfilter/ip6_tables.c:1644 nf_setsockopt+0x196/0x1b0 net/netfilter/nf_sockopt.c:101 ipv6_setsockopt+0x11a/0x130 net/ipv6/ipv6_sockglue.c:998 tcp_setsockopt+0x95/0xb0 net/ipv4/tcp.c:4108 sock_common_setsockopt+0x69/0x80 net/core/sock.c:3944 do_sock_setsockopt net/socket.c:2342 [inline] __sys_setsockopt+0x184/0x200 net/socket.c:2367 __do_sys_setsockopt net/socket.c:2373 [inline] __se_sys_setsockopt net/socket.c:2370 [inline] __x64_sys_setsockopt+0x64/0x80 net/socket.c:2370 x64_sys_call+0x20ec/0x2ff0 arch/x86/include/generated/asm/syscalls_64.h:55 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd2/0x200 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x0000000000001033 -> 0x0000000000001034 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 6050 Comm: syz.2.806 Not tainted 6.16.0-syzkaller-04405-g4b290aae788e #0 PREEMPT(voluntary) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 ==================================================================