bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P12852/1:b..l rcu: (detected by 1, t=10503 jiffies, g=67933, q=1407 ncpus=2) task:kworker/1:9 state:R running task stack:23432 pid:12852 tgid:12852 ppid:2 task_flags:0x4208060 flags:0x00080000 Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker Call Trace: context_switch kernel/sched/core.c:5325 [inline] __schedule+0x1798/0x4cc0 kernel/sched/core.c:6929 preempt_schedule_irq+0xb5/0x150 kernel/sched/core.c:7256 irqentry_exit+0x6f/0x90 kernel/entry/common.c:211 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:lock_is_held_type+0x137/0x190 kernel/locking/lockdep.c:5945 Code: 01 75 44 48 c7 04 24 00 00 00 00 9c 8f 04 24 f7 04 24 00 02 00 00 75 4c 41 f7 c4 00 02 00 00 74 01 fb 65 48 8b 05 79 ed 15 07 <48> 3b 44 24 08 75 43 89 d8 48 83 c4 10 5b 41 5c 41 5d 41 5e 41 5f RSP: 0018:ffffc9001af66d58 EFLAGS: 00000206 RAX: d175565243e18000 RBX: 0000000000000001 RCX: d175565243e18000 RDX: ffff888023953c80 RSI: ffffffff8d6ef4b7 RDI: ffffffff8b9ec4e0 RBP: 00000000ffffffff R08: 0000000000000000 R09: ffffffff891fc608 R10: ffffc9001af67420 R11: fffff520035ece8e R12: 0000000000000246 R13: ffff888023953c80 R14: ffffffff8dd3a860 R15: 0000000000000002 read_pnet_rcu include/net/net_namespace.h:423 [inline] dev_net_rcu include/linux/netdevice.h:2728 [inline] __skb_flow_dissect+0x59a/0x68b0 net/core/flow_dissector.c:1125 __skb_get_hash_net+0xcb/0x2d0 net/core/flow_dissector.c:1898 skb_get_hash include/linux/skbuff.h:1662 [inline] encrypt_packet drivers/net/wireguard/send.c:173 [inline] wg_packet_encrypt_worker+0x39e/0x1700 drivers/net/wireguard/send.c:297 process_one_work kernel/workqueue.c:3263 [inline] process_scheduled_works+0xade/0x17b0 kernel/workqueue.c:3346 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3427 kthread+0x711/0x8a0 kernel/kthread.c:463 ret_from_fork+0x436/0x7d0 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 rcu: rcu_preempt kthread starved for 228 jiffies! g67933 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:27256 pid:16 tgid:16 ppid:2 task_flags:0x208040 flags:0x00080000 Call Trace: context_switch kernel/sched/core.c:5325 [inline] __schedule+0x1798/0x4cc0 kernel/sched/core.c:6929 __schedule_loop kernel/sched/core.c:7011 [inline] schedule+0x165/0x360 kernel/sched/core.c:7026 schedule_timeout+0x12b/0x270 kernel/time/sleep_timeout.c:99 rcu_gp_fqs_loop+0x301/0x1540 kernel/rcu/tree.c:2083 rcu_gp_kthread+0x99/0x390 kernel/rcu/tree.c:2285 kthread+0x711/0x8a0 kernel/kthread.c:463 ret_from_fork+0x436/0x7d0 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 rcu: Stack dump where RCU GP kthread last ran: Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 36 Comm: kworker/u8:2 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 Workqueue: wg-kex-wg2 wg_packet_handshake_send_worker RIP: 0010:__lock_acquire+0x869/0xd20 kernel/locking/lockdep.c:5232 Code: c1 c1 c1 10 31 d1 01 f0 41 89 cf 41 c1 c7 13 29 ce 41 31 f7 01 c1 44 29 f8 44 01 f9 41 c1 c7 04 41 31 c7 49 c1 e7 20 49 09 cf <83> 3d 44 9c bf 0d 00 0f 85 36 02 00 00 48 83 7c 24 28 00 0f 84 bc RSP: 0018:ffffc900000079f0 EFLAGS: 00000006 RAX: 0000000086db7919 RBX: 0000000000000004 RCX: 00000000fe09d4ff RDX: 00000000105209fd RSI: 000000005a44979c RDI: ffff88801d2e9e40 RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffff89258cb5 R10: ffff888152c23dc0 R11: ffffed102a5847ba R12: 0000000000004008 R13: ffff88801d2ea970 R14: ffff88801d2eaa10 R15: 0ac0d5affe09d4ff FS: 0000000000000000(0000) GS:ffff88812639b000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fffe4930c98 CR3: 000000007c8e6000 CR4: 00000000003526f0 Call Trace: lock_acquire+0x120/0x360 kernel/locking/lockdep.c:5868 rcu_lock_acquire include/linux/rcupdate.h:331 [inline] rcu_read_lock include/linux/rcupdate.h:841 [inline] process_backlog+0x584/0x14f0 net/core/dev.c:6543 __napi_poll+0xc4/0x360 net/core/dev.c:7594 napi_poll net/core/dev.c:7657 [inline] net_rx_action+0x5f7/0xdf0 net/core/dev.c:7784 handle_softirqs+0x283/0x870 kernel/softirq.c:622 do_softirq+0xec/0x180 kernel/softirq.c:523 __local_bh_enable_ip+0x17d/0x1c0 kernel/softirq.c:450 local_bh_enable include/linux/bottom_half.h:33 [inline] fpregs_unlock arch/x86/include/asm/fpu/api.h:77 [inline] kernel_fpu_end+0xd2/0x120 arch/x86/kernel/fpu/core.c:479 blake2s_compress+0xe9/0x1b80 lib/crypto/x86/blake2s.h:44 blake2s_update+0x14b/0x450 lib/crypto/blake2s.c:126 hmac+0x288/0x330 drivers/net/wireguard/noise.c:332 kdf+0xde/0x270 drivers/net/wireguard/noise.c:360 mix_dh drivers/net/wireguard/noise.c:413 [inline] wg_noise_handshake_create_initiation+0x278/0x750 drivers/net/wireguard/noise.c:550 wg_packet_send_handshake_initiation drivers/net/wireguard/send.c:34 [inline] wg_packet_handshake_send_worker+0x163/0x320 drivers/net/wireguard/send.c:51 process_one_work kernel/workqueue.c:3263 [inline] process_scheduled_works+0xade/0x17b0 kernel/workqueue.c:3346 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3427 kthread+0x711/0x8a0 kernel/kthread.c:463 ret_from_fork+0x436/0x7d0 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 net_ratelimit: 9606 callbacks suppressed bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) net_ratelimit: 10537 callbacks suppressed bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)