================================================================== BUG: KCSAN: data-race in br_handle_frame_finish / br_handle_frame_finish read to 0xffff88813883a168 of 8 bytes by interrupt on cpu 1: br_handle_frame_finish+0xa9c/0xbe0 net/bridge/br_input.c:147 br_nf_hook_thresh+0x194/0x1d0 br_nf_pre_routing_finish_ipv6+0x4dc/0x500 NF_HOOK include/linux/netfilter.h:307 [inline] br_nf_pre_routing_ipv6+0x1ea/0x280 net/bridge/br_netfilter_ipv6.c:236 br_nf_pre_routing+0x4d1/0xb30 net/bridge/br_netfilter_hooks.c:505 nf_hook_entry_hookfn include/linux/netfilter.h:142 [inline] nf_hook_bridge_pre net/bridge/br_input.c:230 [inline] br_handle_frame+0x463/0xba0 net/bridge/br_input.c:370 __netif_receive_skb_core+0xa4b/0x1df0 net/core/dev.c:5356 __netif_receive_skb_one_core net/core/dev.c:5460 [inline] __netif_receive_skb+0x52/0x1b0 net/core/dev.c:5576 process_backlog+0x23f/0x3e0 net/core/dev.c:6452 __napi_poll+0x65/0x3f0 net/core/dev.c:7017 napi_poll net/core/dev.c:7084 [inline] net_rx_action+0x29e/0x650 net/core/dev.c:7171 __do_softirq+0x158/0x2de kernel/softirq.c:558 run_ksoftirqd+0x1f/0x30 kernel/softirq.c:920 smpboot_thread_fn+0x308/0x4a0 kernel/smpboot.c:164 kthread+0x2c7/0x2e0 kernel/kthread.c:327 ret_from_fork+0x1f/0x30 write to 0xffff88813883a168 of 8 bytes by interrupt on cpu 0: br_handle_frame_finish+0xaae/0xbe0 net/bridge/br_input.c:147 br_nf_hook_thresh+0x194/0x1d0 br_nf_pre_routing_finish_ipv6+0x4dc/0x500 NF_HOOK include/linux/netfilter.h:307 [inline] br_nf_pre_routing_ipv6+0x1ea/0x280 net/bridge/br_netfilter_ipv6.c:236 br_nf_pre_routing+0x4d1/0xb30 net/bridge/br_netfilter_hooks.c:505 nf_hook_entry_hookfn include/linux/netfilter.h:142 [inline] nf_hook_bridge_pre net/bridge/br_input.c:230 [inline] br_handle_frame+0x463/0xba0 net/bridge/br_input.c:370 __netif_receive_skb_core+0xa4b/0x1df0 net/core/dev.c:5356 __netif_receive_skb_one_core net/core/dev.c:5460 [inline] __netif_receive_skb+0x52/0x1b0 net/core/dev.c:5576 process_backlog+0x23f/0x3e0 net/core/dev.c:6452 __napi_poll+0x65/0x3f0 net/core/dev.c:7017 napi_poll net/core/dev.c:7084 [inline] net_rx_action+0x29e/0x650 net/core/dev.c:7171 __do_softirq+0x158/0x2de kernel/softirq.c:558 run_ksoftirqd+0x1f/0x30 kernel/softirq.c:920 smpboot_thread_fn+0x308/0x4a0 kernel/smpboot.c:164 kthread+0x2c7/0x2e0 kernel/kthread.c:327 ret_from_fork+0x1f/0x30 value changed: 0x00000000000554e3 -> 0x00000000000554e4 Reported by Kernel Concurrency Sanitizer on: CPU: 0 PID: 12 Comm: ksoftirqd/0 Not tainted 5.15.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ================================================================== net_ratelimit: 26447 callbacks suppressed bridge0: received packet on veth0_to_batadv with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on batadv_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on batadv_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:3b, vlan:0) bridge0: received packet on batadv_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:3b, vlan:0) bridge0: received packet on veth0_to_batadv with own address as source address (addr:aa:aa:aa:aa:aa:3d, vlan:0) bridge0: received packet on batadv_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on batadv_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:3b, vlan:0) bridge0: received packet on batadv_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:3b, vlan:0) bridge0: received packet on veth0_to_batadv with own address as source address (addr:aa:aa:aa:aa:aa:3d, vlan:0) bridge0: received packet on batadv_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:3b, vlan:0)