batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! batman_adv: batadv0: Interface activated: batadv_slave_0 ================================================================== BUG: KCSAN: data-race in batadv_iv_ogm_schedule / batadv_update_min_mtu write to 0xffff888111501810 of 1 bytes by task 7556 on cpu 0: batadv_iv_ogm_schedule_buff net/batman-adv/bat_iv_ogm.c:803 [inline] batadv_iv_ogm_schedule+0xaa/0x790 net/batman-adv/bat_iv_ogm.c:868 batadv_iv_send_outstanding_bat_ogm_packet+0x44c/0x4b0 net/batman-adv/bat_iv_ogm.c:1712 process_one_work kernel/workqueue.c:3231 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3312 worker_thread+0x526/0x6e0 kernel/workqueue.c:3389 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read to 0xffff888111501810 of 1 bytes by task 7653 on cpu 1: batadv_hardif_min_mtu net/batman-adv/hard-interface.c:589 [inline] batadv_update_min_mtu+0x4b/0x180 net/batman-adv/hard-interface.c:638 batadv_hardif_activate_interface+0x1f7/0x330 net/batman-adv/hard-interface.c:678 batadv_hard_if_event+0x47a/0x1010 net/batman-adv/hard-interface.c:977 notifier_call_chain kernel/notifier.c:93 [inline] raw_notifier_call_chain+0x6f/0x1d0 kernel/notifier.c:461 call_netdevice_notifiers_info+0xae/0x100 net/core/dev.c:1994 __dev_notify_flags+0xff/0x1a0 dev_change_flags+0xab/0xd0 net/core/dev.c:8915 do_setlink+0x844/0x2490 net/core/rtnetlink.c:2900 __rtnl_newlink net/core/rtnetlink.c:3696 [inline] rtnl_newlink+0x11a3/0x1690 net/core/rtnetlink.c:3743 rtnetlink_rcv_msg+0x6aa/0x710 net/core/rtnetlink.c:6647 netlink_rcv_skb+0x12c/0x230 net/netlink/af_netlink.c:2550 rtnetlink_rcv+0x1c/0x30 net/core/rtnetlink.c:6665 netlink_unicast_kernel net/netlink/af_netlink.c:1331 [inline] netlink_unicast+0x599/0x670 net/netlink/af_netlink.c:1357 netlink_sendmsg+0x5cc/0x6e0 net/netlink/af_netlink.c:1901 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg+0x140/0x180 net/socket.c:745 __sys_sendto+0x1e5/0x260 net/socket.c:2204 __do_sys_sendto net/socket.c:2216 [inline] __se_sys_sendto net/socket.c:2212 [inline] __x64_sys_sendto+0x78/0x90 net/socket.c:2212 x64_sys_call+0x2959/0x2d60 arch/x86/include/generated/asm/syscalls_64.h:45 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x04 -> 0x03 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 7653 Comm: syz-executor Not tainted 6.11.0-rc5-syzkaller-00015-g3e9bff3bbe13 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 ==================================================================