==================================================================
BUG: KCSAN: data-race in br_handle_frame_finish / br_handle_frame_finish
read to 0xffff888134c5e170 of 8 bytes by interrupt on cpu 1:
br_handle_frame_finish+0xaa0/0xbe0 net/bridge/br_input.c:147
br_nf_hook_thresh+0x194/0x1d0
br_nf_pre_routing_finish_ipv6+0x4e6/0x500
NF_HOOK include/linux/netfilter.h:307 [inline]
br_nf_pre_routing_ipv6+0x1ea/0x280 net/bridge/br_netfilter_ipv6.c:236
br_nf_pre_routing+0x4d1/0xb30 net/bridge/br_netfilter_hooks.c:505
nf_hook_entry_hookfn include/linux/netfilter.h:142 [inline]
nf_hook_bridge_pre net/bridge/br_input.c:230 [inline]
br_handle_frame+0x483/0xbc0 net/bridge/br_input.c:370
__netif_receive_skb_core+0xa39/0x1e20 net/core/dev.c:5245
__netif_receive_skb_one_core net/core/dev.c:5349 [inline]
__netif_receive_skb+0x52/0x1b0 net/core/dev.c:5465
process_backlog+0x23f/0x3e0 net/core/dev.c:5797
__napi_poll+0x65/0x3f0 net/core/dev.c:6365
napi_poll net/core/dev.c:6432 [inline]
net_rx_action+0x29e/0x650 net/core/dev.c:6519
__do_softirq+0x158/0x2de kernel/softirq.c:558
run_ksoftirqd+0x1f/0x30 kernel/softirq.c:921
smpboot_thread_fn+0x308/0x4a0 kernel/smpboot.c:164
kthread+0x1bf/0x1e0 kernel/kthread.c:377
ret_from_fork+0x1f/0x30
write to 0xffff888134c5e170 of 8 bytes by interrupt on cpu 0:
br_handle_frame_finish+0xab2/0xbe0 net/bridge/br_input.c:147
br_nf_hook_thresh+0x194/0x1d0
br_nf_pre_routing_finish_ipv6+0x4e6/0x500
NF_HOOK include/linux/netfilter.h:307 [inline]
br_nf_pre_routing_ipv6+0x1ea/0x280 net/bridge/br_netfilter_ipv6.c:236
br_nf_pre_routing+0x4d1/0xb30 net/bridge/br_netfilter_hooks.c:505
nf_hook_entry_hookfn include/linux/netfilter.h:142 [inline]
nf_hook_bridge_pre net/bridge/br_input.c:230 [inline]
br_handle_frame+0x483/0xbc0 net/bridge/br_input.c:370
__netif_receive_skb_core+0xa39/0x1e20 net/core/dev.c:5245
__netif_receive_skb_one_core net/core/dev.c:5349 [inline]
__netif_receive_skb+0x52/0x1b0 net/core/dev.c:5465
process_backlog+0x23f/0x3e0 net/core/dev.c:5797
__napi_poll+0x65/0x3f0 net/core/dev.c:6365
napi_poll net/core/dev.c:6432 [inline]
net_rx_action+0x29e/0x650 net/core/dev.c:6519
__do_softirq+0x158/0x2de kernel/softirq.c:558
run_ksoftirqd+0x1f/0x30 kernel/softirq.c:921
smpboot_thread_fn+0x308/0x4a0 kernel/smpboot.c:164
kthread+0x1bf/0x1e0 kernel/kthread.c:377
ret_from_fork+0x1f/0x30
value changed: 0x0000000000021f7e -> 0x0000000000021f7f
Reported by Kernel Concurrency Sanitizer on:
CPU: 0 PID: 12 Comm: ksoftirqd/0 Not tainted 5.17.0-rc7-syzkaller-00227-g68453767131a-dirty #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
==================================================================
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:2a:40:0d:34:ef:2b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:2a:40:0d:34:ef:2b, vlan:0)
net_ratelimit: 36804 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:2a:40:0d:34:ef:2b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:2a:40:0d:34:ef:2b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)