bridge0: received packet on veth1_to_bridge with own address as source address (addr:62:ac:ed:21:b4:19, vlan:0) ================================================================== BUG: KCSAN: data-race in br_handle_frame_finish / br_handle_frame_finish read-write to 0xffff888135554178 of 8 bytes by interrupt on cpu 1: br_handle_frame_finish+0xd4f/0xee0 net/bridge/br_input.c:189 br_nf_pre_routing_finish+0x918/0xd10 net/bridge/br_netfilter_hooks.c:424 NF_HOOK+0x199/0x1d0 include/linux/netfilter.h:302 br_nf_pre_routing+0xaaf/0xba0 net/bridge/br_netfilter_hooks.c:533 nf_hook_entry_hookfn include/linux/netfilter.h:142 [inline] nf_hook_bridge_pre net/bridge/br_input.c:272 [inline] br_handle_frame+0x4ca/0x8e0 net/bridge/br_input.c:416 __netif_receive_skb_core+0x9fb/0x1ec0 net/core/dev.c:5373 __netif_receive_skb_one_core net/core/dev.c:5477 [inline] __netif_receive_skb+0x57/0x1b0 net/core/dev.c:5593 process_backlog+0x21f/0x380 net/core/dev.c:5921 __napi_poll+0x60/0x3b0 net/core/dev.c:6482 napi_poll net/core/dev.c:6549 [inline] net_rx_action+0x322/0x6c0 net/core/dev.c:6659 __do_softirq+0xe4/0x2b0 kernel/softirq.c:571 run_ksoftirqd+0x23/0x30 kernel/softirq.c:934 smpboot_thread_fn+0x2f8/0x490 kernel/smpboot.c:164 kthread+0x1ac/0x1e0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308 read-write to 0xffff888135554178 of 8 bytes by interrupt on cpu 0: br_handle_frame_finish+0xd4f/0xee0 net/bridge/br_input.c:189 br_nf_pre_routing_finish+0x918/0xd10 net/bridge/br_netfilter_hooks.c:424 NF_HOOK+0x199/0x1d0 include/linux/netfilter.h:302 br_nf_pre_routing+0xaaf/0xba0 net/bridge/br_netfilter_hooks.c:533 nf_hook_entry_hookfn include/linux/netfilter.h:142 [inline] nf_hook_bridge_pre net/bridge/br_input.c:272 [inline] br_handle_frame+0x4ca/0x8e0 net/bridge/br_input.c:416 __netif_receive_skb_core+0x9fb/0x1ec0 net/core/dev.c:5373 __netif_receive_skb_one_core net/core/dev.c:5477 [inline] __netif_receive_skb+0x57/0x1b0 net/core/dev.c:5593 process_backlog+0x21f/0x380 net/core/dev.c:5921 __napi_poll+0x60/0x3b0 net/core/dev.c:6482 napi_poll net/core/dev.c:6549 [inline] net_rx_action+0x322/0x6c0 net/core/dev.c:6659 __do_softirq+0xe4/0x2b0 kernel/softirq.c:571 run_ksoftirqd+0x23/0x30 kernel/softirq.c:934 smpboot_thread_fn+0x2f8/0x490 kernel/smpboot.c:164 kthread+0x1ac/0x1e0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308 value changed: 0x000000000000de74 -> 0x000000000000de75 Reported by Kernel Concurrency Sanitizer on: CPU: 0 PID: 12 Comm: ksoftirqd/0 Not tainted 6.3.0-rc1-syzkaller-00230-gef5f68cc1f82 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 ================================================================== bridge0: received packet on veth1_to_bridge with own address as source address (addr:62:ac:ed:21:b4:19, vlan:0) bridge0: received packet on veth1_to_bridge with own address as source address (addr:62:ac:ed:21:b4:19, vlan:0) bridge0: received packet on veth1_to_bridge with own address as source address (addr:62:ac:ed:21:b4:19, vlan:0) bridge0: received packet on veth1_to_bridge with own address as source address (addr:62:ac:ed:21:b4:19, vlan:0) bridge0: received packet on veth1_to_bridge with own address as source address (addr:62:ac:ed:21:b4:19, vlan:0) net_ratelimit: 38194 callbacks suppressed bridge0: received packet on veth1_to_bridge with own address as source address (addr:62:ac:ed:21:b4:19, vlan:0) bridge0: received packet on veth1_to_bridge with own address as source address (addr:62:ac:ed:21:b4:19, vlan:0) bridge0: received packet on veth1_to_bridge with own address as source address (addr:62:ac:ed:21:b4:19, vlan:0) bridge0: received packet on veth1_to_bridge with own address as source address (addr:62:ac:ed:21:b4:19, vlan:0) bridge0: received packet on veth1_to_bridge with own address as source address (addr:62:ac:ed:21:b4:19, vlan:0)