================================================================== BUG: KCSAN: data-race in br_handle_frame_finish / br_handle_frame_finish read-write to 0xffff888127a5e178 of 8 bytes by interrupt on cpu 1: br_handle_frame_finish+0xd4f/0xee0 net/bridge/br_input.c:189 br_nf_hook_thresh+0x1ed/0x220 br_nf_pre_routing_finish_ipv6+0x511/0x540 NF_HOOK include/linux/netfilter.h:302 [inline] br_nf_pre_routing_ipv6+0x1e3/0x2a0 net/bridge/br_netfilter_ipv6.c:237 br_nf_pre_routing+0x526/0xba0 net/bridge/br_netfilter_hooks.c:507 nf_hook_entry_hookfn include/linux/netfilter.h:142 [inline] nf_hook_bridge_pre net/bridge/br_input.c:272 [inline] br_handle_frame+0x4ca/0x8e0 net/bridge/br_input.c:416 __netif_receive_skb_core+0x9e8/0x1e90 net/core/dev.c:5374 __netif_receive_skb_one_core net/core/dev.c:5478 [inline] __netif_receive_skb+0x57/0x1b0 net/core/dev.c:5594 process_backlog+0x21f/0x380 net/core/dev.c:5922 __napi_poll+0x60/0x3b0 net/core/dev.c:6483 napi_poll net/core/dev.c:6550 [inline] net_rx_action+0x31a/0x6c0 net/core/dev.c:6660 __do_softirq+0xc1/0x265 kernel/softirq.c:571 run_ksoftirqd+0x17/0x20 kernel/softirq.c:939 smpboot_thread_fn+0x30a/0x4a0 kernel/smpboot.c:164 kthread+0x1d7/0x210 kernel/kthread.c:379 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308 read-write to 0xffff888127a5e178 of 8 bytes by interrupt on cpu 0: br_handle_frame_finish+0xd4f/0xee0 net/bridge/br_input.c:189 br_nf_hook_thresh+0x1ed/0x220 br_nf_pre_routing_finish_ipv6+0x511/0x540 NF_HOOK include/linux/netfilter.h:302 [inline] br_nf_pre_routing_ipv6+0x1e3/0x2a0 net/bridge/br_netfilter_ipv6.c:237 br_nf_pre_routing+0x526/0xba0 net/bridge/br_netfilter_hooks.c:507 nf_hook_entry_hookfn include/linux/netfilter.h:142 [inline] nf_hook_bridge_pre net/bridge/br_input.c:272 [inline] br_handle_frame+0x4ca/0x8e0 net/bridge/br_input.c:416 __netif_receive_skb_core+0x9e8/0x1e90 net/core/dev.c:5374 __netif_receive_skb_one_core net/core/dev.c:5478 [inline] __netif_receive_skb+0x57/0x1b0 net/core/dev.c:5594 process_backlog+0x21f/0x380 net/core/dev.c:5922 __napi_poll+0x60/0x3b0 net/core/dev.c:6483 napi_poll net/core/dev.c:6550 [inline] net_rx_action+0x31a/0x6c0 net/core/dev.c:6660 __do_softirq+0xc1/0x265 kernel/softirq.c:571 run_ksoftirqd+0x17/0x20 kernel/softirq.c:939 smpboot_thread_fn+0x30a/0x4a0 kernel/smpboot.c:164 kthread+0x1d7/0x210 kernel/kthread.c:379 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308 value changed: 0x000000000000ee12 -> 0x000000000000ee13 Reported by Kernel Concurrency Sanitizer on: CPU: 0 PID: 13 Comm: ksoftirqd/0 Not tainted 6.3.0-syzkaller-05127-g5c7ecada25d2 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 ================================================================== bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) net_ratelimit: 9778 callbacks suppressed bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)