bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P12852/1:b..l
rcu: (detected by 1, t=10503 jiffies, g=67933, q=1407 ncpus=2)
task:kworker/1:9 state:R running task stack:23432 pid:12852 tgid:12852 ppid:2 task_flags:0x4208060 flags:0x00080000
Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker
Call Trace:
context_switch kernel/sched/core.c:5325 [inline]
__schedule+0x1798/0x4cc0 kernel/sched/core.c:6929
preempt_schedule_irq+0xb5/0x150 kernel/sched/core.c:7256
irqentry_exit+0x6f/0x90 kernel/entry/common.c:211
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:lock_is_held_type+0x137/0x190 kernel/locking/lockdep.c:5945
Code: 01 75 44 48 c7 04 24 00 00 00 00 9c 8f 04 24 f7 04 24 00 02 00 00 75 4c 41 f7 c4 00 02 00 00 74 01 fb 65 48 8b 05 79 ed 15 07 <48> 3b 44 24 08 75 43 89 d8 48 83 c4 10 5b 41 5c 41 5d 41 5e 41 5f
RSP: 0018:ffffc9001af66d58 EFLAGS: 00000206
RAX: d175565243e18000 RBX: 0000000000000001 RCX: d175565243e18000
RDX: ffff888023953c80 RSI: ffffffff8d6ef4b7 RDI: ffffffff8b9ec4e0
RBP: 00000000ffffffff R08: 0000000000000000 R09: ffffffff891fc608
R10: ffffc9001af67420 R11: fffff520035ece8e R12: 0000000000000246
R13: ffff888023953c80 R14: ffffffff8dd3a860 R15: 0000000000000002
read_pnet_rcu include/net/net_namespace.h:423 [inline]
dev_net_rcu include/linux/netdevice.h:2728 [inline]
__skb_flow_dissect+0x59a/0x68b0 net/core/flow_dissector.c:1125
__skb_get_hash_net+0xcb/0x2d0 net/core/flow_dissector.c:1898
skb_get_hash include/linux/skbuff.h:1662 [inline]
encrypt_packet drivers/net/wireguard/send.c:173 [inline]
wg_packet_encrypt_worker+0x39e/0x1700 drivers/net/wireguard/send.c:297
process_one_work kernel/workqueue.c:3263 [inline]
process_scheduled_works+0xade/0x17b0 kernel/workqueue.c:3346
worker_thread+0x8a0/0xda0 kernel/workqueue.c:3427
kthread+0x711/0x8a0 kernel/kthread.c:463
ret_from_fork+0x436/0x7d0 arch/x86/kernel/process.c:148
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
rcu: rcu_preempt kthread starved for 228 jiffies! g67933 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0
rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt state:R running task stack:27256 pid:16 tgid:16 ppid:2 task_flags:0x208040 flags:0x00080000
Call Trace:
context_switch kernel/sched/core.c:5325 [inline]
__schedule+0x1798/0x4cc0 kernel/sched/core.c:6929
__schedule_loop kernel/sched/core.c:7011 [inline]
schedule+0x165/0x360 kernel/sched/core.c:7026
schedule_timeout+0x12b/0x270 kernel/time/sleep_timeout.c:99
rcu_gp_fqs_loop+0x301/0x1540 kernel/rcu/tree.c:2083
rcu_gp_kthread+0x99/0x390 kernel/rcu/tree.c:2285
kthread+0x711/0x8a0 kernel/kthread.c:463
ret_from_fork+0x436/0x7d0 arch/x86/kernel/process.c:148
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
rcu: Stack dump where RCU GP kthread last ran:
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 36 Comm: kworker/u8:2 Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025
Workqueue: wg-kex-wg2 wg_packet_handshake_send_worker
RIP: 0010:__lock_acquire+0x869/0xd20 kernel/locking/lockdep.c:5232
Code: c1 c1 c1 10 31 d1 01 f0 41 89 cf 41 c1 c7 13 29 ce 41 31 f7 01 c1 44 29 f8 44 01 f9 41 c1 c7 04 41 31 c7 49 c1 e7 20 49 09 cf <83> 3d 44 9c bf 0d 00 0f 85 36 02 00 00 48 83 7c 24 28 00 0f 84 bc
RSP: 0018:ffffc900000079f0 EFLAGS: 00000006
RAX: 0000000086db7919 RBX: 0000000000000004 RCX: 00000000fe09d4ff
RDX: 00000000105209fd RSI: 000000005a44979c RDI: ffff88801d2e9e40
RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffff89258cb5
R10: ffff888152c23dc0 R11: ffffed102a5847ba R12: 0000000000004008
R13: ffff88801d2ea970 R14: ffff88801d2eaa10 R15: 0ac0d5affe09d4ff
FS: 0000000000000000(0000) GS:ffff88812639b000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fffe4930c98 CR3: 000000007c8e6000 CR4: 00000000003526f0
Call Trace:
lock_acquire+0x120/0x360 kernel/locking/lockdep.c:5868
rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
rcu_read_lock include/linux/rcupdate.h:841 [inline]
process_backlog+0x584/0x14f0 net/core/dev.c:6543
__napi_poll+0xc4/0x360 net/core/dev.c:7594
napi_poll net/core/dev.c:7657 [inline]
net_rx_action+0x5f7/0xdf0 net/core/dev.c:7784
handle_softirqs+0x283/0x870 kernel/softirq.c:622
do_softirq+0xec/0x180 kernel/softirq.c:523
__local_bh_enable_ip+0x17d/0x1c0 kernel/softirq.c:450
local_bh_enable include/linux/bottom_half.h:33 [inline]
fpregs_unlock arch/x86/include/asm/fpu/api.h:77 [inline]
kernel_fpu_end+0xd2/0x120 arch/x86/kernel/fpu/core.c:479
blake2s_compress+0xe9/0x1b80 lib/crypto/x86/blake2s.h:44
blake2s_update+0x14b/0x450 lib/crypto/blake2s.c:126
hmac+0x288/0x330 drivers/net/wireguard/noise.c:332
kdf+0xde/0x270 drivers/net/wireguard/noise.c:360
mix_dh drivers/net/wireguard/noise.c:413 [inline]
wg_noise_handshake_create_initiation+0x278/0x750 drivers/net/wireguard/noise.c:550
wg_packet_send_handshake_initiation drivers/net/wireguard/send.c:34 [inline]
wg_packet_handshake_send_worker+0x163/0x320 drivers/net/wireguard/send.c:51
process_one_work kernel/workqueue.c:3263 [inline]
process_scheduled_works+0xade/0x17b0 kernel/workqueue.c:3346
worker_thread+0x8a0/0xda0 kernel/workqueue.c:3427
kthread+0x711/0x8a0 kernel/kthread.c:463
ret_from_fork+0x436/0x7d0 arch/x86/kernel/process.c:148
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
net_ratelimit: 9606 callbacks suppressed
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
net_ratelimit: 10537 callbacks suppressed
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)