bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P9/1:b..l
rcu: (detected by 1, t=10503 jiffies, g=38269, q=150 ncpus=2)
task:kworker/0:1 state:R running task stack:23944 pid:9 ppid:2 flags:0x00004000
Workqueue: wg-kex-wg1 wg_packet_handshake_receive_worker
Call Trace:
context_switch kernel/sched/core.c:5381 [inline]
__schedule+0x1553/0x45a0 kernel/sched/core.c:6700
preempt_schedule_irq+0xbf/0x150 kernel/sched/core.c:7010
irqentry_exit+0x67/0x70 kernel/entry/common.c:438
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:687
RIP: 0010:__reset_page_owner+0x9b/0x190 mm/page_owner.c:150
Code: f6 85 c0 44 0f 4f f0 48 c7 c3 80 79 33 97 48 c1 eb 03 eb 07 4c 03 3d b4 ee 4a 15 66 83 fd 1f 0f 87 8c 00 00 00 e8 25 97 9e ff <41> 83 ee 01 0f 82 ba 00 00 00 e8 16 97 9e ff 4c 89 ff be 08 00 00
RSP: 0018:ffffc900000e75a0 EFLAGS: 00000293
RAX: ffffffff81e88adb RBX: 1ffffffff2e66f30 RCX: ffff88801be48000
RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff88801bd2c584
RBP: 0000000000000003 R08: ffff88801bd2c577 R09: 1ffff110037a58ae
R10: dffffc0000000000 R11: ffffed10037a58af R12: dffffc0000000000
R13: ffff88801bd2c590 R14: 0000000000000001 R15: ffff88801bd2c5b8
reset_page_owner include/linux/page_owner.h:24 [inline]
free_pages_prepare mm/page_alloc.c:1181 [inline]
free_unref_page_prepare+0x7b2/0x8c0 mm/page_alloc.c:2365
free_unref_page+0x32/0x2e0 mm/page_alloc.c:2458
__slab_free+0x35a/0x400 mm/slub.c:3736
qlink_free mm/kasan/quarantine.c:166 [inline]
qlist_free_all+0x75/0xd0 mm/kasan/quarantine.c:185
kasan_quarantine_reduce+0x143/0x160 mm/kasan/quarantine.c:292
____kasan_kmalloc mm/kasan/common.c:341 [inline]
__kasan_kmalloc+0x22/0xa0 mm/kasan/common.c:384
kmalloc include/linux/slab.h:600 [inline]
kzalloc include/linux/slab.h:721 [inline]
keypair_create drivers/net/wireguard/noise.c:100 [inline]
wg_noise_handshake_begin_session+0xd4/0xbd0 drivers/net/wireguard/noise.c:827
wg_packet_send_handshake_response+0x13d/0x300 drivers/net/wireguard/send.c:96
wg_receive_handshake_packet drivers/net/wireguard/receive.c:154 [inline]
wg_packet_handshake_receive_worker+0x6a7/0x1070 drivers/net/wireguard/receive.c:213
process_one_work kernel/workqueue.c:2653 [inline]
process_scheduled_works+0xa5d/0x15d0 kernel/workqueue.c:2730
worker_thread+0xa55/0xfc0 kernel/workqueue.c:2811
kthread+0x2fa/0x390 kernel/kthread.c:388
ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:152
ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:293
rcu: rcu_preempt kthread starved for 389 jiffies! g38269 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0
rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt state:R running task stack:26760 pid:17 ppid:2 flags:0x00004000
Call Trace:
context_switch kernel/sched/core.c:5381 [inline]
__schedule+0x1553/0x45a0 kernel/sched/core.c:6700
schedule+0xbd/0x170 kernel/sched/core.c:6774
schedule_timeout+0x188/0x2d0 kernel/time/timer.c:2168
rcu_gp_fqs_loop+0x313/0x1590 kernel/rcu/tree.c:1667
rcu_gp_kthread+0x9d/0x3b0 kernel/rcu/tree.c:1866
kthread+0x2fa/0x390 kernel/kthread.c:388
ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:152
ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:293
rcu: Stack dump where RCU GP kthread last ran:
Sending NMI from CPU 1 to CPUs 0:
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
NMI backtrace for cpu 0
CPU: 0 PID: 9652 Comm: syz.0.1233 Not tainted syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026
RIP: 0010:kasan_mem_to_shadow include/linux/kasan.h:60 [inline]
RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:127 [inline]
RIP: 0010:memory_is_poisoned mm/kasan/generic.c:159 [inline]
RIP: 0010:check_region_inline mm/kasan/generic.c:178 [inline]
RIP: 0010:kasan_check_range+0x3d/0x290 mm/kasan/generic.c:187
Code: 56 41 55 41 54 53 4c 8d 04 37 49 39 f8 0f 82 13 02 00 00 49 89 f9 49 c1 e9 2f 41 81 f9 ff ff 01 00 0f 82 ff 01 00 00 49 89 ff <49> c1 ef 03 49 ba 00 00 00 00 00 fc ff df 4f 8d 1c 17 49 ff c8 4d
RSP: 0018:ffffc900000063c8 EFLAGS: 00000046
RAX: 0000000000000001 RBX: 0000000000000021 RCX: ffffffff81684020
RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff911c6500
RBP: ffffc90000006648 R08: ffffffff911c6508 R09: 000000000001ffff
R10: dffffc0000000000 R11: fffffbfff2238ca1 R12: 00000000d8332a6f
R13: ffff88807c46da00 R14: 00000000a9f2d431 R15: ffffffff911c6500
FS: 00007f91c2fb76c0(0000) GS:ffff8880b8e00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000200000768000 CR3: 000000002f0dd000 CR4: 00000000003506f0
DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff3 DR7: 0000000000000600
Call Trace:
instrument_atomic_read include/linux/instrumented.h:68 [inline]
_test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline]
hlock_class kernel/locking/lockdep.c:228 [inline]
__lock_acquire+0x1090/0x7d40 kernel/locking/lockdep.c:5133
lock_acquire+0x19e/0x420 kernel/locking/lockdep.c:5754
rcu_lock_acquire include/linux/rcupdate.h:334 [inline]
rcu_read_lock include/linux/rcupdate.h:786 [inline]
__perf_output_begin kernel/events/ring_buffer.c:163 [inline]
perf_output_begin_forward+0xd4/0xa40 kernel/events/ring_buffer.c:273
__perf_event_output kernel/events/core.c:7977 [inline]
perf_event_output_forward+0x25a/0x3e0 kernel/events/core.c:7995
__perf_event_overflow+0x447/0x630 kernel/events/core.c:9720
perf_event_overflow kernel/events/core.c:9741 [inline]
perf_swevent_hrtimer+0x439/0x610 kernel/events/core.c:11230
__run_hrtimer kernel/time/hrtimer.c:1750 [inline]
__hrtimer_run_queues+0x4e1/0xc40 kernel/time/hrtimer.c:1814
hrtimer_interrupt+0x3c9/0x9c0 kernel/time/hrtimer.c:1876
local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1077 [inline]
__sysvec_apic_timer_interrupt+0xfb/0x3b0 arch/x86/kernel/apic/apic.c:1094
instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1088 [inline]
sysvec_apic_timer_interrupt+0x51/0xc0 arch/x86/kernel/apic/apic.c:1088
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:687
RIP: 0010:console_trylock_spinning kernel/printk/printk.c:2008 [inline]
RIP: 0010:vprintk_emit+0x46f/0x610 kernel/printk/printk.c:2340
Code: 85 3f 01 00 00 e8 c1 a9 1b 00 45 89 f7 48 85 db 48 8b 1c 24 75 07 e8 b0 a9 1b 00 eb 06 e8 a9 a9 1b 00 fb 48 c7 c7 00 64 12 8d <31> f6 ba 01 00 00 00 31 c9 41 b8 01 00 00 00 45 31 c9 53 e8 b9 b1
RSP: 0018:ffffc90000007040 EFLAGS: 00000246
RAX: ffffffff816b7857 RBX: ffffffff816b76fb RCX: ffff88807c46da00
RDX: 0000000000000100 RSI: 0000000000000000 RDI: ffffffff8d126400
RBP: ffffc90000007130 R08: ffffffff911c652f R09: 1ffffffff2238ca5
R10: dffffc0000000000 R11: fffffbfff2238ca6 R12: dffffc0000000000
R13: 1ffff92000000e0c R14: 000000000000006e R15: 000000000000006e
_printk+0xde/0x130 kernel/printk/printk.c:2366
br_fdb_update+0x5c5/0x630 net/bridge/br_fdb.c:871
br_handle_frame_finish+0x5e5/0x18f0 net/bridge/br_input.c:141
br_nf_hook_thresh+0x3cd/0x4a0 net/bridge/br_netfilter_hooks.c:1184
br_nf_pre_routing_finish_ipv6+0x9dc/0xd00 net/bridge/br_netfilter_ipv6.c:-1
NF_HOOK include/linux/netfilter.h:304 [inline]
br_nf_pre_routing_ipv6+0x349/0x6b0 net/bridge/br_netfilter_ipv6.c:184
nf_hook_entry_hookfn include/linux/netfilter.h:144 [inline]
nf_hook_bridge_pre net/bridge/br_input.c:277 [inline]
br_handle_frame+0x1245/0x14d0 net/bridge/br_input.c:424
__netif_receive_skb_core+0xfab/0x3af0 net/core/dev.c:5540
__netif_receive_skb_one_core net/core/dev.c:5644 [inline]
__netif_receive_skb+0x74/0x290 net/core/dev.c:5760
process_backlog+0x391/0x6f0 net/core/dev.c:6088
__napi_poll+0xc0/0x460 net/core/dev.c:6650
napi_poll net/core/dev.c:6717 [inline]
net_rx_action+0x616/0xc40 net/core/dev.c:6853
handle_softirqs+0x280/0x820 kernel/softirq.c:578
__do_softirq kernel/softirq.c:612 [inline]
invoke_softirq kernel/softirq.c:452 [inline]
__irq_exit_rcu+0xd3/0x190 kernel/softirq.c:661
irq_exit_rcu+0x9/0x20 kernel/softirq.c:673
instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1088 [inline]
sysvec_apic_timer_interrupt+0xa4/0xc0 arch/x86/kernel/apic/apic.c:1088
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:687
RIP: 0010:__raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline]
RIP: 0010:_raw_spin_unlock_irqrestore+0xc0/0x120 kernel/locking/spinlock.c:194
Code: c7 44 24 20 00 00 00 00 9c 8f 44 24 20 f7 44 24 20 00 02 00 00 41 c6 04 07 f8 75 4b f7 c3 00 02 00 00 74 01 fb bf 01 00 00 00 0b 74 cc f6 65 8b 05 4c a1 73 75 85 c0 74 3c 48 c7 04 24 0e 36
RSP: 0018:ffffc900050177e0 EFLAGS: 00000206
RAX: dffffc0000000004 RBX: 0000000000000a06 RCX: 11cc538acd2abb00
RDX: dffffc0000000000 RSI: ffffffff8acac9e0 RDI: 0000000000000001
RBP: ffffc90005017860 R08: ffffffff911c652f R09: 1ffffffff2238ca5
R10: dffffc0000000000 R11: fffffbfff2238ca6 R12: dffffc0000000000
R13: 0000000000000000 R14: ffff888017c4ecc0 R15: 1ffff92000a02efc
spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]
__unfreeze_partials+0x190/0x210 mm/slub.c:2660
put_cpu_partial+0x17c/0x250 mm/slub.c:2743
__slab_free+0x319/0x400 mm/slub.c:3700
qlink_free mm/kasan/quarantine.c:166 [inline]
qlist_free_all+0x75/0xd0 mm/kasan/quarantine.c:185
kasan_quarantine_reduce+0x143/0x160 mm/kasan/quarantine.c:292
__kasan_slab_alloc+0x22/0x80 mm/kasan/common.c:306
kasan_slab_alloc include/linux/kasan.h:188 [inline]
slab_post_alloc_hook+0x6e/0x4b0 mm/slab.h:767
slab_alloc_node mm/slub.c:3495 [inline]
__kmem_cache_alloc_node+0x13a/0x250 mm/slub.c:3534
kmalloc_trace+0x2a/0xe0 mm/slab_common.c:1098
kmalloc include/linux/slab.h:600 [inline]
kzalloc include/linux/slab.h:721 [inline]
bpf_prog_alloc_no_stats+0xd8/0x440 kernel/bpf/core.c:102
bpf_prog_alloc+0x3d/0x1a0 kernel/bpf/core.c:136
bpf_prog_load+0x6eb/0x1670 kernel/bpf/syscall.c:2684
__sys_bpf+0x5ba/0x890 kernel/bpf/syscall.c:5477
__do_sys_bpf kernel/bpf/syscall.c:5581 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5579 [inline]
__x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5579
do_syscall_x64 arch/x86/entry/common.c:46 [inline]
do_syscall_64+0x55/0xa0 arch/x86/entry/common.c:76
entry_SYSCALL_64_after_hwframe+0x68/0xd2
RIP: 0033:0x7f91c219cdd9
Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f91c2fb7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f91c2415fa0 RCX: 00007f91c219cdd9
RDX: 0000000000000094 RSI: 0000200000000640 RDI: 0000000000000005
RBP: 00007f91c2232d69 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f91c2416038 R14: 00007f91c2415fa0 R15: 00007ffce94f8e08
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
net_ratelimit: 11181 callbacks suppressed
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:dc:9d:33:b8:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:dc:9d:33:b8:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)