bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P9/1:b..l rcu: (detected by 1, t=10503 jiffies, g=38269, q=150 ncpus=2) task:kworker/0:1 state:R running task stack:23944 pid:9 ppid:2 flags:0x00004000 Workqueue: wg-kex-wg1 wg_packet_handshake_receive_worker Call Trace: context_switch kernel/sched/core.c:5381 [inline] __schedule+0x1553/0x45a0 kernel/sched/core.c:6700 preempt_schedule_irq+0xbf/0x150 kernel/sched/core.c:7010 irqentry_exit+0x67/0x70 kernel/entry/common.c:438 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:687 RIP: 0010:__reset_page_owner+0x9b/0x190 mm/page_owner.c:150 Code: f6 85 c0 44 0f 4f f0 48 c7 c3 80 79 33 97 48 c1 eb 03 eb 07 4c 03 3d b4 ee 4a 15 66 83 fd 1f 0f 87 8c 00 00 00 e8 25 97 9e ff <41> 83 ee 01 0f 82 ba 00 00 00 e8 16 97 9e ff 4c 89 ff be 08 00 00 RSP: 0018:ffffc900000e75a0 EFLAGS: 00000293 RAX: ffffffff81e88adb RBX: 1ffffffff2e66f30 RCX: ffff88801be48000 RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff88801bd2c584 RBP: 0000000000000003 R08: ffff88801bd2c577 R09: 1ffff110037a58ae R10: dffffc0000000000 R11: ffffed10037a58af R12: dffffc0000000000 R13: ffff88801bd2c590 R14: 0000000000000001 R15: ffff88801bd2c5b8 reset_page_owner include/linux/page_owner.h:24 [inline] free_pages_prepare mm/page_alloc.c:1181 [inline] free_unref_page_prepare+0x7b2/0x8c0 mm/page_alloc.c:2365 free_unref_page+0x32/0x2e0 mm/page_alloc.c:2458 __slab_free+0x35a/0x400 mm/slub.c:3736 qlink_free mm/kasan/quarantine.c:166 [inline] qlist_free_all+0x75/0xd0 mm/kasan/quarantine.c:185 kasan_quarantine_reduce+0x143/0x160 mm/kasan/quarantine.c:292 ____kasan_kmalloc mm/kasan/common.c:341 [inline] __kasan_kmalloc+0x22/0xa0 mm/kasan/common.c:384 kmalloc include/linux/slab.h:600 [inline] kzalloc include/linux/slab.h:721 [inline] keypair_create drivers/net/wireguard/noise.c:100 [inline] wg_noise_handshake_begin_session+0xd4/0xbd0 drivers/net/wireguard/noise.c:827 wg_packet_send_handshake_response+0x13d/0x300 drivers/net/wireguard/send.c:96 wg_receive_handshake_packet drivers/net/wireguard/receive.c:154 [inline] wg_packet_handshake_receive_worker+0x6a7/0x1070 drivers/net/wireguard/receive.c:213 process_one_work kernel/workqueue.c:2653 [inline] process_scheduled_works+0xa5d/0x15d0 kernel/workqueue.c:2730 worker_thread+0xa55/0xfc0 kernel/workqueue.c:2811 kthread+0x2fa/0x390 kernel/kthread.c:388 ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:152 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:293 rcu: rcu_preempt kthread starved for 389 jiffies! g38269 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:26760 pid:17 ppid:2 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:5381 [inline] __schedule+0x1553/0x45a0 kernel/sched/core.c:6700 schedule+0xbd/0x170 kernel/sched/core.c:6774 schedule_timeout+0x188/0x2d0 kernel/time/timer.c:2168 rcu_gp_fqs_loop+0x313/0x1590 kernel/rcu/tree.c:1667 rcu_gp_kthread+0x9d/0x3b0 kernel/rcu/tree.c:1866 kthread+0x2fa/0x390 kernel/kthread.c:388 ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:152 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:293 rcu: Stack dump where RCU GP kthread last ran: Sending NMI from CPU 1 to CPUs 0: bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) NMI backtrace for cpu 0 CPU: 0 PID: 9652 Comm: syz.0.1233 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 RIP: 0010:kasan_mem_to_shadow include/linux/kasan.h:60 [inline] RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:127 [inline] RIP: 0010:memory_is_poisoned mm/kasan/generic.c:159 [inline] RIP: 0010:check_region_inline mm/kasan/generic.c:178 [inline] RIP: 0010:kasan_check_range+0x3d/0x290 mm/kasan/generic.c:187 Code: 56 41 55 41 54 53 4c 8d 04 37 49 39 f8 0f 82 13 02 00 00 49 89 f9 49 c1 e9 2f 41 81 f9 ff ff 01 00 0f 82 ff 01 00 00 49 89 ff <49> c1 ef 03 49 ba 00 00 00 00 00 fc ff df 4f 8d 1c 17 49 ff c8 4d RSP: 0018:ffffc900000063c8 EFLAGS: 00000046 RAX: 0000000000000001 RBX: 0000000000000021 RCX: ffffffff81684020 RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff911c6500 RBP: ffffc90000006648 R08: ffffffff911c6508 R09: 000000000001ffff R10: dffffc0000000000 R11: fffffbfff2238ca1 R12: 00000000d8332a6f R13: ffff88807c46da00 R14: 00000000a9f2d431 R15: ffffffff911c6500 FS: 00007f91c2fb76c0(0000) GS:ffff8880b8e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000200000768000 CR3: 000000002f0dd000 CR4: 00000000003506f0 DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff3 DR7: 0000000000000600 Call Trace: instrument_atomic_read include/linux/instrumented.h:68 [inline] _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline] hlock_class kernel/locking/lockdep.c:228 [inline] __lock_acquire+0x1090/0x7d40 kernel/locking/lockdep.c:5133 lock_acquire+0x19e/0x420 kernel/locking/lockdep.c:5754 rcu_lock_acquire include/linux/rcupdate.h:334 [inline] rcu_read_lock include/linux/rcupdate.h:786 [inline] __perf_output_begin kernel/events/ring_buffer.c:163 [inline] perf_output_begin_forward+0xd4/0xa40 kernel/events/ring_buffer.c:273 __perf_event_output kernel/events/core.c:7977 [inline] perf_event_output_forward+0x25a/0x3e0 kernel/events/core.c:7995 __perf_event_overflow+0x447/0x630 kernel/events/core.c:9720 perf_event_overflow kernel/events/core.c:9741 [inline] perf_swevent_hrtimer+0x439/0x610 kernel/events/core.c:11230 __run_hrtimer kernel/time/hrtimer.c:1750 [inline] __hrtimer_run_queues+0x4e1/0xc40 kernel/time/hrtimer.c:1814 hrtimer_interrupt+0x3c9/0x9c0 kernel/time/hrtimer.c:1876 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1077 [inline] __sysvec_apic_timer_interrupt+0xfb/0x3b0 arch/x86/kernel/apic/apic.c:1094 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1088 [inline] sysvec_apic_timer_interrupt+0x51/0xc0 arch/x86/kernel/apic/apic.c:1088 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:687 RIP: 0010:console_trylock_spinning kernel/printk/printk.c:2008 [inline] RIP: 0010:vprintk_emit+0x46f/0x610 kernel/printk/printk.c:2340 Code: 85 3f 01 00 00 e8 c1 a9 1b 00 45 89 f7 48 85 db 48 8b 1c 24 75 07 e8 b0 a9 1b 00 eb 06 e8 a9 a9 1b 00 fb 48 c7 c7 00 64 12 8d <31> f6 ba 01 00 00 00 31 c9 41 b8 01 00 00 00 45 31 c9 53 e8 b9 b1 RSP: 0018:ffffc90000007040 EFLAGS: 00000246 RAX: ffffffff816b7857 RBX: ffffffff816b76fb RCX: ffff88807c46da00 RDX: 0000000000000100 RSI: 0000000000000000 RDI: ffffffff8d126400 RBP: ffffc90000007130 R08: ffffffff911c652f R09: 1ffffffff2238ca5 R10: dffffc0000000000 R11: fffffbfff2238ca6 R12: dffffc0000000000 R13: 1ffff92000000e0c R14: 000000000000006e R15: 000000000000006e _printk+0xde/0x130 kernel/printk/printk.c:2366 br_fdb_update+0x5c5/0x630 net/bridge/br_fdb.c:871 br_handle_frame_finish+0x5e5/0x18f0 net/bridge/br_input.c:141 br_nf_hook_thresh+0x3cd/0x4a0 net/bridge/br_netfilter_hooks.c:1184 br_nf_pre_routing_finish_ipv6+0x9dc/0xd00 net/bridge/br_netfilter_ipv6.c:-1 NF_HOOK include/linux/netfilter.h:304 [inline] br_nf_pre_routing_ipv6+0x349/0x6b0 net/bridge/br_netfilter_ipv6.c:184 nf_hook_entry_hookfn include/linux/netfilter.h:144 [inline] nf_hook_bridge_pre net/bridge/br_input.c:277 [inline] br_handle_frame+0x1245/0x14d0 net/bridge/br_input.c:424 __netif_receive_skb_core+0xfab/0x3af0 net/core/dev.c:5540 __netif_receive_skb_one_core net/core/dev.c:5644 [inline] __netif_receive_skb+0x74/0x290 net/core/dev.c:5760 process_backlog+0x391/0x6f0 net/core/dev.c:6088 __napi_poll+0xc0/0x460 net/core/dev.c:6650 napi_poll net/core/dev.c:6717 [inline] net_rx_action+0x616/0xc40 net/core/dev.c:6853 handle_softirqs+0x280/0x820 kernel/softirq.c:578 __do_softirq kernel/softirq.c:612 [inline] invoke_softirq kernel/softirq.c:452 [inline] __irq_exit_rcu+0xd3/0x190 kernel/softirq.c:661 irq_exit_rcu+0x9/0x20 kernel/softirq.c:673 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1088 [inline] sysvec_apic_timer_interrupt+0xa4/0xc0 arch/x86/kernel/apic/apic.c:1088 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:687 RIP: 0010:__raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] RIP: 0010:_raw_spin_unlock_irqrestore+0xc0/0x120 kernel/locking/spinlock.c:194 Code: c7 44 24 20 00 00 00 00 9c 8f 44 24 20 f7 44 24 20 00 02 00 00 41 c6 04 07 f8 75 4b f7 c3 00 02 00 00 74 01 fb bf 01 00 00 00 0b 74 cc f6 65 8b 05 4c a1 73 75 85 c0 74 3c 48 c7 04 24 0e 36 RSP: 0018:ffffc900050177e0 EFLAGS: 00000206 RAX: dffffc0000000004 RBX: 0000000000000a06 RCX: 11cc538acd2abb00 RDX: dffffc0000000000 RSI: ffffffff8acac9e0 RDI: 0000000000000001 RBP: ffffc90005017860 R08: ffffffff911c652f R09: 1ffffffff2238ca5 R10: dffffc0000000000 R11: fffffbfff2238ca6 R12: dffffc0000000000 R13: 0000000000000000 R14: ffff888017c4ecc0 R15: 1ffff92000a02efc spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] __unfreeze_partials+0x190/0x210 mm/slub.c:2660 put_cpu_partial+0x17c/0x250 mm/slub.c:2743 __slab_free+0x319/0x400 mm/slub.c:3700 qlink_free mm/kasan/quarantine.c:166 [inline] qlist_free_all+0x75/0xd0 mm/kasan/quarantine.c:185 kasan_quarantine_reduce+0x143/0x160 mm/kasan/quarantine.c:292 __kasan_slab_alloc+0x22/0x80 mm/kasan/common.c:306 kasan_slab_alloc include/linux/kasan.h:188 [inline] slab_post_alloc_hook+0x6e/0x4b0 mm/slab.h:767 slab_alloc_node mm/slub.c:3495 [inline] __kmem_cache_alloc_node+0x13a/0x250 mm/slub.c:3534 kmalloc_trace+0x2a/0xe0 mm/slab_common.c:1098 kmalloc include/linux/slab.h:600 [inline] kzalloc include/linux/slab.h:721 [inline] bpf_prog_alloc_no_stats+0xd8/0x440 kernel/bpf/core.c:102 bpf_prog_alloc+0x3d/0x1a0 kernel/bpf/core.c:136 bpf_prog_load+0x6eb/0x1670 kernel/bpf/syscall.c:2684 __sys_bpf+0x5ba/0x890 kernel/bpf/syscall.c:5477 __do_sys_bpf kernel/bpf/syscall.c:5581 [inline] __se_sys_bpf kernel/bpf/syscall.c:5579 [inline] __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5579 do_syscall_x64 arch/x86/entry/common.c:46 [inline] do_syscall_64+0x55/0xa0 arch/x86/entry/common.c:76 entry_SYSCALL_64_after_hwframe+0x68/0xd2 RIP: 0033:0x7f91c219cdd9 Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f91c2fb7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: ffffffffffffffda RBX: 00007f91c2415fa0 RCX: 00007f91c219cdd9 RDX: 0000000000000094 RSI: 0000200000000640 RDI: 0000000000000005 RBP: 00007f91c2232d69 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f91c2416038 R14: 00007f91c2415fa0 R15: 00007ffce94f8e08 bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) net_ratelimit: 11181 callbacks suppressed bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:dc:9d:33:b8:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:dc:9d:33:b8:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)