bridge0: received packet on veth0_to_bridge with own address as source address (addr:b6:66:51:3b:69:e4, vlan:0) rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: (detected by 1, t=10502 jiffies, g=17589, q=2771 ncpus=2) rcu: All QSes seen, last rcu_preempt kthread activity 9131 (4294977168-4294968037), jiffies_till_next_fqs=1, root ->qsmask 0x0 rcu: rcu_preempt kthread starved for 9132 jiffies! g17589 f0x2 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:27552 pid:18 tgid:18 ppid:2 task_flags:0x208040 flags:0x00004000 Call Trace: <TASK> context_switch kernel/sched/core.c:5378 [inline] __schedule+0xf43/0x5890 kernel/sched/core.c:6765 __schedule_loop kernel/sched/core.c:6842 [inline] schedule+0xe7/0x350 kernel/sched/core.c:6857 schedule_timeout+0x124/0x280 kernel/time/sleep_timeout.c:99 rcu_gp_fqs_loop+0x1eb/0xb00 kernel/rcu/tree.c:2024 rcu_gp_kthread+0x271/0x380 kernel/rcu/tree.c:2226 kthread+0x3af/0x750 kernel/kthread.c:464 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 </TASK> rcu: Stack dump where RCU GP kthread last ran: CPU: 1 UID: 0 PID: 117 Comm: kworker/1:2 Not tainted 6.14.0-rc7-syzkaller-00196-g88d324e69ea9 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: wg-kex-wg2 wg_packet_handshake_receive_worker RIP: 0010:__orc_find+0x20/0xf0 arch/x86/kernel/unwind_orc.c:99 Code: 90 90 90 90 90 90 90 90 90 90 41 57 41 56 41 55 49 89 cd 89 d1 41 54 4c 8d 64 8f fc 55 53 48 83 ec 08 85 d2 0f 84 99 00 00 00 <49> 39 fc 49 89 fe 48 89 f0 72 7b 48 b9 00 00 00 00 00 fc ff df 49 RSP: 0018:ffffc90000a27798 EFLAGS: 00000202 RAX: ffffffff9103fbc6 RBX: 0000000000000002 RCX: 0000000000000015 RDX: 0000000000000015 RSI: ffffffff9103fbc6 RDI: ffffffff907c9758 RBP: ffffc90000a27890 R08: ffffffff9103fc44 R09: ffffffff9103face R10: ffffc90000a27848 R11: 0000000000011cdc R12: ffffffff907c97a8 R13: ffffffff821cdca8 R14: ffffc90000a2787d R15: ffffffff821cdca8 FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffc43183c08 CR3: 000000000df80000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <IRQ> orc_find arch/x86/kernel/unwind_orc.c:227 [inline] unwind_next_frame+0x2be/0x20c0 arch/x86/kernel/unwind_orc.c:494 arch_stack_walk+0x95/0x100 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x95/0xd0 kernel/stacktrace.c:122 kasan_save_stack+0x33/0x60 mm/kasan/common.c:47 kasan_save_track+0x14/0x30 mm/kasan/common.c:68 unpoison_slab_object mm/kasan/common.c:319 [inline] __kasan_slab_alloc+0x89/0x90 mm/kasan/common.c:345 kasan_slab_alloc include/linux/kasan.h:250 [inline] slab_post_alloc_hook mm/slub.c:4115 [inline] slab_alloc_node mm/slub.c:4164 [inline] kmem_cache_alloc_node_noprof+0x223/0x3c0 mm/slub.c:4216 kmalloc_reserve+0x18b/0x2c0 net/core/skbuff.c:515 pskb_expand_head+0x237/0x1050 net/core/skbuff.c:2185 __skb_cow include/linux/skbuff.h:3769 [inline] skb_cow_head include/linux/skbuff.h:3803 [inline] batadv_skb_head_push+0xf5/0x290 net/batman-adv/soft-interface.c:72 batadv_interface_tx+0x11e2/0x1b70 net/batman-adv/soft-interface.c:336 __netdev_start_xmit include/linux/netdevice.h:5151 [inline] netdev_start_xmit include/linux/netdevice.h:5160 [inline] xmit_one net/core/dev.c:3800 [inline] dev_hard_start_xmit+0x9a/0x7b0 net/core/dev.c:3816 __dev_queue_xmit+0x7f0/0x43e0 net/core/dev.c:4652 dev_queue_xmit include/linux/netdevice.h:3313 [inline] br_dev_queue_push_xmit+0x274/0x8a0 net/bridge/br_forward.c:53 NF_HOOK include/linux/netfilter.h:314 [inline] NF_HOOK include/linux/netfilter.h:308 [inline] br_forward_finish+0xf5/0x130 net/bridge/br_forward.c:66 br_nf_hook_thresh+0x303/0x410 net/bridge/br_netfilter_hooks.c:1170 br_nf_forward_finish+0x66a/0xba0 net/bridge/br_netfilter_hooks.c:665 NF_HOOK include/linux/netfilter.h:314 [inline] NF_HOOK include/linux/netfilter.h:308 [inline] br_nf_forward_arp net/bridge/br_netfilter_hooks.c:755 [inline] br_nf_forward+0x16da/0x1bd0 net/bridge/br_netfilter_hooks.c:778 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline] nf_hook_slow+0xbb/0x200 net/netfilter/core.c:626 nf_hook+0x474/0x7d0 include/linux/netfilter.h:269 NF_HOOK include/linux/netfilter.h:312 [inline] __br_forward+0x1be/0x5b0 net/bridge/br_forward.c:115 deliver_clone+0x5b/0xa0 net/bridge/br_forward.c:131 maybe_deliver+0xa7/0x120 net/bridge/br_forward.c:190 br_flood+0x17b/0x5e0 net/bridge/br_forward.c:237 br_handle_frame_finish+0xea2/0x1c90 net/bridge/br_input.c:220 nf_hook_bridge_pre net/bridge/br_input.c:304 [inline] br_handle_frame+0xd90/0x14a0 net/bridge/br_input.c:433 __netif_receive_skb_core.constprop.0+0xa20/0x4330 net/core/dev.c:5790 __netif_receive_skb_one_core+0xb1/0x1e0 net/core/dev.c:5894 __netif_receive_skb+0x1d/0x160 net/core/dev.c:6009 process_backlog+0x443/0x15f0 net/core/dev.c:6357 __napi_poll.constprop.0+0xb7/0x550 net/core/dev.c:7191 napi_poll net/core/dev.c:7260 [inline] net_rx_action+0xa94/0x1010 net/core/dev.c:7382 handle_softirqs+0x213/0x8f0 kernel/softirq.c:561 __do_softirq kernel/softirq.c:595 [inline] invoke_softirq kernel/softirq.c:435 [inline] __irq_exit_rcu+0x109/0x170 kernel/softirq.c:662 irq_exit_rcu+0x9/0x30 kernel/softirq.c:678 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline] sysvec_apic_timer_interrupt+0xa4/0xc0 arch/x86/kernel/apic/apic.c:1049 </IRQ> <TASK> asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:__phys_addr+0xa/0x150 arch/x86/mm/physaddr.c:16 Code: da 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 41 54 45 31 e4 55 <bd> 00 00 00 80 53 48 89 fb e8 88 1d 4f 00 48 01 dd 48 89 df 41 0f RSP: 0018:ffffc900025df868 EFLAGS: 00000246 RAX: ffff88801da9d640 RBX: 0000000000000000 RCX: 0000000000130006 RDX: 0000000000130007 RSI: ffffea0000e0d100 RDI: ffff8880373a0dc0 RBP: ffff8880373a0dc0 R08: ffff888038346700 R09: 0000000000130006 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: ffffc900025df8b8 R15: ffff888038346700 virt_to_folio include/linux/mm.h:1295 [inline] virt_to_slab mm/slab.h:211 [inline] qlink_to_cache mm/kasan/quarantine.c:131 [inline] qlist_free_all+0x66/0x120 mm/kasan/quarantine.c:176 kasan_quarantine_reduce+0x195/0x1e0 mm/kasan/quarantine.c:286 __kasan_slab_alloc+0x69/0x90 mm/kasan/common.c:329 kasan_slab_alloc include/linux/kasan.h:250 [inline] slab_post_alloc_hook mm/slub.c:4115 [inline] slab_alloc_node mm/slub.c:4164 [inline] __kmalloc_cache_noprof+0x243/0x410 mm/slub.c:4320 kmalloc_noprof include/linux/slab.h:901 [inline] kzalloc_noprof include/linux/slab.h:1037 [inline] keypair_create drivers/net/wireguard/noise.c:100 [inline] wg_noise_handshake_begin_session+0xe5/0xe80 drivers/net/wireguard/noise.c:827 wg_packet_send_handshake_response+0x218/0x310 drivers/net/wireguard/send.c:96 wg_receive_handshake_packet+0x248/0xbf0 drivers/net/wireguard/receive.c:154 wg_packet_handshake_receive_worker+0x17f/0x3a0 drivers/net/wireguard/receive.c:213 process_one_work+0x9c5/0x1ba0 kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x6c8/0xf00 kernel/workqueue.c:3400 kthread+0x3af/0x750 kernel/kthread.c:464 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 </TASK> bridge0: received packet on veth0_to_bridge with own address as source address (addr:b6:66:51:3b:69:e4, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:b6:66:51:3b:69:e4, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:b6:66:51:3b:69:e4, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:b6:66:51:3b:69:e4, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:b6:66:51:3b:69:e4, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:b6:66:51:3b:69:e4, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:b6:66:51:3b:69:e4, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:b6:66:51:3b:69:e4, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:b6:66:51:3b:69:e4, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:b6:66:51:3b:69:e4, vlan:0)