bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
==================================================================
BUG: KCSAN: data-race in batadv_bla_tx / batadv_bla_tx
write to 0xffff88811549b9a0 of 8 bytes by interrupt on cpu 0:
batadv_bla_update_own_backbone_gw net/batman-adv/bridge_loop_avoidance.c:577 [inline]
batadv_bla_tx+0x7b4/0xc40 net/batman-adv/bridge_loop_avoidance.c:2106
batadv_interface_tx+0x314/0xaf0 net/batman-adv/soft-interface.c:240
__netdev_start_xmit include/linux/netdevice.h:4928 [inline]
netdev_start_xmit include/linux/netdevice.h:4937 [inline]
xmit_one net/core/dev.c:3588 [inline]
dev_hard_start_xmit+0x119/0x3f0 net/core/dev.c:3604
__dev_queue_xmit+0xfba/0x2040 net/core/dev.c:4432
dev_queue_xmit include/linux/netdevice.h:3094 [inline]
br_dev_queue_push_xmit+0x425/0x4e0 net/bridge/br_forward.c:53
NF_HOOK include/linux/netfilter.h:314 [inline]
br_forward_finish+0x90/0x160 net/bridge/br_forward.c:66
br_nf_forward_finish+0x6b1/0x720 net/bridge/br_netfilter_hooks.c:690
NF_HOOK include/linux/netfilter.h:314 [inline]
br_nf_forward_arp net/bridge/br_netfilter_hooks.c:780 [inline]
br_nf_forward+0xae2/0xe70 net/bridge/br_netfilter_hooks.c:803
nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
nf_hook_slow+0x86/0x1b0 net/netfilter/core.c:626
nf_hook include/linux/netfilter.h:269 [inline]
NF_HOOK include/linux/netfilter.h:312 [inline]
__br_forward+0x27d/0x360 net/bridge/br_forward.c:115
deliver_clone net/bridge/br_forward.c:131 [inline]
maybe_deliver+0x1c0/0x260 net/bridge/br_forward.c:190
br_flood+0x246/0x470 net/bridge/br_forward.c:236
br_handle_frame_finish+0xcfb/0xe70 net/bridge/br_input.c:215
nf_hook_bridge_pre net/bridge/br_input.c:299 [inline]
br_handle_frame+0x5a0/0x9a0 net/bridge/br_input.c:424
__netif_receive_skb_core+0xb00/0x2310 net/core/dev.c:5564
__netif_receive_skb_one_core net/core/dev.c:5668 [inline]
__netif_receive_skb+0x5a/0x280 net/core/dev.c:5783
process_backlog+0x22e/0x440 net/core/dev.c:6115
__napi_poll+0x63/0x3c0 net/core/dev.c:6779
napi_poll net/core/dev.c:6848 [inline]
net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
handle_softirqs+0xbf/0x280 kernel/softirq.c:554
do_softirq+0x5e/0x90 kernel/softirq.c:455
__local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382
__raw_write_unlock_bh include/linux/rwlock_api_smp.h:281 [inline]
_raw_write_unlock_bh+0x1f/0x30 kernel/locking/spinlock.c:366
neigh_periodic_work+0x55a/0x600 net/core/neighbour.c:1019
process_one_work kernel/workqueue.c:3229 [inline]
process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310
worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391
kthread+0x1d1/0x210 kernel/kthread.c:389
ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
write to 0xffff88811549b9a0 of 8 bytes by interrupt on cpu 1:
batadv_bla_update_own_backbone_gw net/batman-adv/bridge_loop_avoidance.c:577 [inline]
batadv_bla_tx+0x7b4/0xc40 net/batman-adv/bridge_loop_avoidance.c:2106
batadv_interface_tx+0x314/0xaf0 net/batman-adv/soft-interface.c:240
__netdev_start_xmit include/linux/netdevice.h:4928 [inline]
netdev_start_xmit include/linux/netdevice.h:4937 [inline]
xmit_one net/core/dev.c:3588 [inline]
dev_hard_start_xmit+0x119/0x3f0 net/core/dev.c:3604
__dev_queue_xmit+0xfba/0x2040 net/core/dev.c:4432
dev_queue_xmit include/linux/netdevice.h:3094 [inline]
br_dev_queue_push_xmit+0x425/0x4e0 net/bridge/br_forward.c:53
br_nf_dev_queue_xmit+0x41a/0xc40
NF_HOOK include/linux/netfilter.h:314 [inline]
br_nf_post_routing+0x86a/0x930 net/bridge/br_netfilter_hooks.c:994
nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
nf_hook_slow+0x86/0x1b0 net/netfilter/core.c:626
nf_hook include/linux/netfilter.h:269 [inline]
NF_HOOK include/linux/netfilter.h:312 [inline]
br_forward_finish+0x120/0x160 net/bridge/br_forward.c:66
br_nf_forward_finish+0x6b1/0x720 net/bridge/br_netfilter_hooks.c:690
NF_HOOK include/linux/netfilter.h:314 [inline]
br_nf_forward_ip+0x5c2/0x5d0 net/bridge/br_netfilter_hooks.c:744
br_nf_forward+0x5a7/0xe70 net/bridge/br_netfilter_hooks.c:801
nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
nf_hook_slow+0x86/0x1b0 net/netfilter/core.c:626
nf_hook include/linux/netfilter.h:269 [inline]
NF_HOOK include/linux/netfilter.h:312 [inline]
__br_forward+0x27d/0x360 net/bridge/br_forward.c:115
deliver_clone net/bridge/br_forward.c:131 [inline]
maybe_deliver+0x1c0/0x260 net/bridge/br_forward.c:190
br_flood+0x246/0x470 net/bridge/br_forward.c:236
br_handle_frame_finish+0xcfb/0xe70 net/bridge/br_input.c:215
br_nf_hook_thresh+0x1e5/0x220
br_nf_pre_routing_finish_ipv6+0x575/0x5a0
NF_HOOK include/linux/netfilter.h:314 [inline]
br_nf_pre_routing_ipv6+0x1f6/0x2a0 net/bridge/br_netfilter_ipv6.c:184
br_nf_pre_routing+0x517/0xbc0 net/bridge/br_netfilter_hooks.c:533
nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
nf_hook_bridge_pre net/bridge/br_input.c:277 [inline]
br_handle_frame+0x4dd/0x9a0 net/bridge/br_input.c:424
__netif_receive_skb_core+0xb00/0x2310 net/core/dev.c:5564
__netif_receive_skb_one_core net/core/dev.c:5668 [inline]
__netif_receive_skb+0x5a/0x280 net/core/dev.c:5783
process_backlog+0x22e/0x440 net/core/dev.c:6115
__napi_poll+0x63/0x3c0 net/core/dev.c:6779
napi_poll net/core/dev.c:6848 [inline]
net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
handle_softirqs+0xbf/0x280 kernel/softirq.c:554
run_ksoftirqd+0x1c/0x30 kernel/softirq.c:927
smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164
kthread+0x1d1/0x210 kernel/kthread.c:389
ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
value changed: 0x0000000100001c2e -> 0x0000000100001c2f
Reported by Kernel Concurrency Sanitizer on:
CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Tainted: G W 6.12.0-rc5-syzkaller-00299-g11066801dd4b #0
Tainted: [W]=WARN
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
==================================================================
net_ratelimit: 19368 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)