veth0_vlan: entered promiscuous mode veth1_vlan: entered promiscuous mode ================================================================== BUG: KCSAN: data-race in pcpu_alloc_noprof / pcpu_free_area read-write to 0xffffffff88bdf3ac of 4 bytes by task 316 on cpu 0: pcpu_update_empty_pages mm/percpu.c:602 [inline] pcpu_block_update_hint_free mm/percpu.c:1044 [inline] pcpu_free_area+0x4dc/0x570 mm/percpu.c:1302 free_percpu+0x1c6/0xb30 mm/percpu.c:2246 htab_free_elems kernel/bpf/hashtab.c:287 [inline] prealloc_destroy+0xea/0x1a0 kernel/bpf/hashtab.c:382 htab_map_free+0x4a0/0x620 kernel/bpf/hashtab.c:1561 bpf_map_free kernel/bpf/syscall.c:744 [inline] bpf_map_free_deferred+0xb0/0x140 kernel/bpf/syscall.c:768 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read to 0xffffffff88bdf3ac of 4 bytes by task 11259 on cpu 1: pcpu_alloc_noprof+0x9b6/0x10a0 mm/percpu.c:1894 fib_nh_common_init+0x4a/0x2b0 net/ipv4/fib_semantics.c:590 fib6_nh_init+0xea5/0x15d0 net/ipv6/route.c:3622 ip6_route_info_create+0x7b2/0xba0 net/ipv6/route.c:3809 addrconf_f6i_alloc+0x188/0x280 net/ipv6/route.c:4588 ipv6_add_addr+0x3c8/0x820 net/ipv6/addrconf.c:1120 inet6_addr_add+0x3ff/0x660 net/ipv6/addrconf.c:3062 inet6_rtm_newaddr+0x4c7/0x5a0 net/ipv6/addrconf.c:5050 rtnetlink_rcv_msg+0x6aa/0x710 net/core/rtnetlink.c:6675 netlink_rcv_skb+0x12c/0x230 net/netlink/af_netlink.c:2551 rtnetlink_rcv+0x1c/0x30 net/core/rtnetlink.c:6693 netlink_unicast_kernel net/netlink/af_netlink.c:1331 [inline] netlink_unicast+0x599/0x670 net/netlink/af_netlink.c:1357 netlink_sendmsg+0x5cc/0x6e0 net/netlink/af_netlink.c:1901 sock_sendmsg_nosec net/socket.c:729 [inline] __sock_sendmsg+0x140/0x180 net/socket.c:744 __sys_sendto+0x1d6/0x260 net/socket.c:2214 __do_sys_sendto net/socket.c:2226 [inline] __se_sys_sendto net/socket.c:2222 [inline] __x64_sys_sendto+0x78/0x90 net/socket.c:2222 x64_sys_call+0x2959/0x2d60 arch/x86/include/generated/asm/syscalls_64.h:45 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x0000006d -> 0x0000006e Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 11259 Comm: syz-executor Not tainted 6.12.0-rc3-syzkaller-00007-g6485cf5ea253 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 ================================================================== veth0_macvtap: entered promiscuous mode veth1_macvtap: entered promiscuous mode batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! batman_adv: batadv0: Interface activated: batadv_slave_0