batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 ================================================================== BUG: KCSAN: data-race in _prb_read_valid / data_alloc write to 0xffffffff8686bff0 of 8 bytes by task 23866 on cpu 1: data_alloc+0x271/0x2b0 kernel/printk/printk_ringbuffer.c:1095 prb_reserve+0x808/0xaf0 kernel/printk/printk_ringbuffer.c:1669 vprintk_store+0x56d/0x860 kernel/printk/printk.c:2326 vprintk_emit+0x178/0x650 kernel/printk/printk.c:2426 vprintk_default+0x26/0x30 kernel/printk/printk.c:2465 vprintk+0x1d/0x30 kernel/printk/printk_safe.c:82 _printk+0x79/0xa0 kernel/printk/printk.c:2475 __ext4_warning+0x12b/0x140 fs/ext4/super.c:1010 ext4_update_dynamic_rev+0x7c/0xc0 fs/ext4/super.c:1129 ext4_set_feature_large_file fs/ext4/ext4.h:2127 [inline] ext4_do_update_inode fs/ext4/inode.c:5232 [inline] ext4_mark_iloc_dirty+0xb49/0xda0 fs/ext4/inode.c:5869 __ext4_mark_inode_dirty+0x2e2/0x3f0 fs/ext4/inode.c:6074 ext4_ext_truncate+0x5a/0x170 fs/ext4/extents.c:4457 ext4_truncate+0x6f8/0xac0 fs/ext4/inode.c:4232 ext4_process_orphan+0x110/0x1c0 fs/ext4/orphan.c:339 ext4_orphan_cleanup+0x6a8/0xa00 fs/ext4/orphan.c:474 __ext4_fill_super fs/ext4/super.c:5607 [inline] ext4_fill_super+0x3171/0x34e0 fs/ext4/super.c:5726 get_tree_bdev_flags+0x291/0x300 fs/super.c:1636 get_tree_bdev+0x1f/0x30 fs/super.c:1659 ext4_get_tree+0x1c/0x30 fs/ext4/super.c:5758 vfs_get_tree+0x54/0x1d0 fs/super.c:1759 do_new_mount+0x207/0x680 fs/namespace.c:3881 path_mount+0x4a4/0xb20 fs/namespace.c:4208 do_mount fs/namespace.c:4221 [inline] __do_sys_mount fs/namespace.c:4432 [inline] __se_sys_mount+0x28f/0x2e0 fs/namespace.c:4409 __x64_sys_mount+0x67/0x80 fs/namespace.c:4409 x64_sys_call+0xd36/0x2fb0 arch/x86/include/generated/asm/syscalls_64.h:166 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd0/0x1a0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffffffff8686bff0 of 16 bytes by task 23692 on cpu 0: desc_read kernel/printk/printk_ringbuffer.c:482 [inline] desc_read_finalized_seq kernel/printk/printk_ringbuffer.c:1874 [inline] prb_read kernel/printk/printk_ringbuffer.c:1922 [inline] _prb_read_valid+0x1bc/0x920 kernel/printk/printk_ringbuffer.c:2113 desc_update_last_finalized kernel/printk/printk_ringbuffer.c:1515 [inline] prb_final_commit+0x136/0x1e0 kernel/printk/printk_ringbuffer.c:1782 vprintk_store+0x741/0x860 kernel/printk/printk.c:2352 vprintk_emit+0x178/0x650 kernel/printk/printk.c:2426 vprintk_default+0x26/0x30 kernel/printk/printk.c:2465 vprintk+0x1d/0x30 kernel/printk/printk_safe.c:82 _printk+0x79/0xa0 kernel/printk/printk.c:2475 batadv_check_known_mac_addr+0x135/0x170 net/batman-adv/hard-interface.c:526 batadv_hard_if_event+0x3e8/0xef0 net/batman-adv/hard-interface.c:991 notifier_call_chain kernel/notifier.c:85 [inline] raw_notifier_call_chain+0x6c/0x1b0 kernel/notifier.c:453 call_netdevice_notifiers_info+0xae/0x100 net/core/dev.c:2176 call_netdevice_notifiers_extack net/core/dev.c:2214 [inline] call_netdevice_notifiers net/core/dev.c:2228 [inline] netif_set_mac_address+0x204/0x260 net/core/dev.c:9589 do_setlink+0x634/0x27f0 net/core/rtnetlink.c:3103 rtnl_changelink net/core/rtnetlink.c:3769 [inline] __rtnl_newlink net/core/rtnetlink.c:3928 [inline] rtnl_newlink+0xe75/0x12d0 net/core/rtnetlink.c:4065 rtnetlink_rcv_msg+0x5fb/0x6d0 net/core/rtnetlink.c:6955 netlink_rcv_skb+0x120/0x220 net/netlink/af_netlink.c:2534 rtnetlink_rcv+0x1c/0x30 net/core/rtnetlink.c:6982 netlink_unicast_kernel net/netlink/af_netlink.c:1313 [inline] netlink_unicast+0x5a1/0x670 net/netlink/af_netlink.c:1339 netlink_sendmsg+0x58b/0x6b0 net/netlink/af_netlink.c:1883 sock_sendmsg_nosec net/socket.c:712 [inline] __sock_sendmsg+0x142/0x180 net/socket.c:727 __sys_sendto+0x268/0x330 net/socket.c:2180 __do_sys_sendto net/socket.c:2187 [inline] __se_sys_sendto net/socket.c:2183 [inline] __x64_sys_sendto+0x76/0x90 net/socket.c:2183 x64_sys_call+0x2eb6/0x2fb0 arch/x86/include/generated/asm/syscalls_64.h:45 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd0/0x1a0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 23692 Comm: syz-executor Not tainted 6.15.0-rc6-syzkaller-00047-ge9565e23cd89 #0 PREEMPT(voluntary) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 ================================================================== batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! batman_adv: batadv0: Interface activated: batadv_slave_0