================================================================== BUG: KCSAN: data-race in br_handle_frame_finish / br_handle_frame_finish read-write to 0xffff8881347f0178 of 8 bytes by interrupt on cpu 0: br_handle_frame_finish+0xd4f/0xee0 net/bridge/br_input.c:189 br_nf_hook_thresh+0x1ed/0x220 br_nf_pre_routing_finish_ipv6+0x511/0x540 NF_HOOK include/linux/netfilter.h:302 [inline] br_nf_pre_routing_ipv6+0x1e3/0x2a0 net/bridge/br_netfilter_ipv6.c:237 br_nf_pre_routing+0x526/0xba0 net/bridge/br_netfilter_hooks.c:507 nf_hook_entry_hookfn include/linux/netfilter.h:142 [inline] nf_hook_bridge_pre net/bridge/br_input.c:272 [inline] br_handle_frame+0x4ca/0x8e0 net/bridge/br_input.c:416 __netif_receive_skb_core+0x9fb/0x1ec0 net/core/dev.c:5373 __netif_receive_skb_one_core net/core/dev.c:5477 [inline] __netif_receive_skb+0x57/0x1b0 net/core/dev.c:5593 process_backlog+0x21f/0x380 net/core/dev.c:5921 __napi_poll+0x60/0x3b0 net/core/dev.c:6482 napi_poll net/core/dev.c:6549 [inline] net_rx_action+0x322/0x6c0 net/core/dev.c:6659 __do_softirq+0xe4/0x2b0 kernel/softirq.c:571 run_ksoftirqd+0x23/0x30 kernel/softirq.c:934 smpboot_thread_fn+0x2f8/0x490 kernel/smpboot.c:164 kthread+0x1ac/0x1e0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308 read-write to 0xffff8881347f0178 of 8 bytes by interrupt on cpu 1: br_handle_frame_finish+0xd4f/0xee0 net/bridge/br_input.c:189 br_nf_hook_thresh+0x1ed/0x220 br_nf_pre_routing_finish_ipv6+0x511/0x540 NF_HOOK include/linux/netfilter.h:302 [inline] br_nf_pre_routing_ipv6+0x1e3/0x2a0 net/bridge/br_netfilter_ipv6.c:237 br_nf_pre_routing+0x526/0xba0 net/bridge/br_netfilter_hooks.c:507 nf_hook_entry_hookfn include/linux/netfilter.h:142 [inline] nf_hook_bridge_pre net/bridge/br_input.c:272 [inline] br_handle_frame+0x4ca/0x8e0 net/bridge/br_input.c:416 __netif_receive_skb_core+0x9fb/0x1ec0 net/core/dev.c:5373 __netif_receive_skb_one_core net/core/dev.c:5477 [inline] __netif_receive_skb+0x57/0x1b0 net/core/dev.c:5593 process_backlog+0x21f/0x380 net/core/dev.c:5921 __napi_poll+0x60/0x3b0 net/core/dev.c:6482 napi_poll net/core/dev.c:6549 [inline] net_rx_action+0x322/0x6c0 net/core/dev.c:6659 __do_softirq+0xe4/0x2b0 kernel/softirq.c:571 run_ksoftirqd+0x23/0x30 kernel/softirq.c:934 smpboot_thread_fn+0x2f8/0x490 kernel/smpboot.c:164 kthread+0x1ac/0x1e0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308 value changed: 0x000000000000181e -> 0x000000000000181f Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 18 Comm: ksoftirqd/1 Not tainted 6.3.0-rc4-syzkaller-00025-g3a93e40326c8 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 ================================================================== net_ratelimit: 38175 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:c7:43:b8:a0:bf, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:c7:43:b8:a0:bf, vlan:0) net_ratelimit: 34122 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:c7:43:b8:a0:bf, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)