bridge0: received packet on veth0_to_bridge with own address as source address (addr:b6:66:51:3b:69:e4, vlan:0)
rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: 	(detected by 1, t=10502 jiffies, g=17589, q=2771 ncpus=2)
rcu: All QSes seen, last rcu_preempt kthread activity 9131 (4294977168-4294968037), jiffies_till_next_fqs=1, root ->qsmask 0x0
rcu: rcu_preempt kthread starved for 9132 jiffies! g17589 f0x2 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1
rcu: 	Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt     state:R  running task     stack:27552 pid:18    tgid:18    ppid:2      task_flags:0x208040 flags:0x00004000
Call Trace:
 <TASK>
 context_switch kernel/sched/core.c:5378 [inline]
 __schedule+0xf43/0x5890 kernel/sched/core.c:6765
 __schedule_loop kernel/sched/core.c:6842 [inline]
 schedule+0xe7/0x350 kernel/sched/core.c:6857
 schedule_timeout+0x124/0x280 kernel/time/sleep_timeout.c:99
 rcu_gp_fqs_loop+0x1eb/0xb00 kernel/rcu/tree.c:2024
 rcu_gp_kthread+0x271/0x380 kernel/rcu/tree.c:2226
 kthread+0x3af/0x750 kernel/kthread.c:464
 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:148
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 </TASK>
rcu: Stack dump where RCU GP kthread last ran:
CPU: 1 UID: 0 PID: 117 Comm: kworker/1:2 Not tainted 6.14.0-rc7-syzkaller-00196-g88d324e69ea9 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
Workqueue: wg-kex-wg2 wg_packet_handshake_receive_worker
RIP: 0010:__orc_find+0x20/0xf0 arch/x86/kernel/unwind_orc.c:99
Code: 90 90 90 90 90 90 90 90 90 90 41 57 41 56 41 55 49 89 cd 89 d1 41 54 4c 8d 64 8f fc 55 53 48 83 ec 08 85 d2 0f 84 99 00 00 00 <49> 39 fc 49 89 fe 48 89 f0 72 7b 48 b9 00 00 00 00 00 fc ff df 49
RSP: 0018:ffffc90000a27798 EFLAGS: 00000202
RAX: ffffffff9103fbc6 RBX: 0000000000000002 RCX: 0000000000000015
RDX: 0000000000000015 RSI: ffffffff9103fbc6 RDI: ffffffff907c9758
RBP: ffffc90000a27890 R08: ffffffff9103fc44 R09: ffffffff9103face
R10: ffffc90000a27848 R11: 0000000000011cdc R12: ffffffff907c97a8
R13: ffffffff821cdca8 R14: ffffc90000a2787d R15: ffffffff821cdca8
FS:  0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ffc43183c08 CR3: 000000000df80000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <IRQ>
 orc_find arch/x86/kernel/unwind_orc.c:227 [inline]
 unwind_next_frame+0x2be/0x20c0 arch/x86/kernel/unwind_orc.c:494
 arch_stack_walk+0x95/0x100 arch/x86/kernel/stacktrace.c:25
 stack_trace_save+0x95/0xd0 kernel/stacktrace.c:122
 kasan_save_stack+0x33/0x60 mm/kasan/common.c:47
 kasan_save_track+0x14/0x30 mm/kasan/common.c:68
 unpoison_slab_object mm/kasan/common.c:319 [inline]
 __kasan_slab_alloc+0x89/0x90 mm/kasan/common.c:345
 kasan_slab_alloc include/linux/kasan.h:250 [inline]
 slab_post_alloc_hook mm/slub.c:4115 [inline]
 slab_alloc_node mm/slub.c:4164 [inline]
 kmem_cache_alloc_node_noprof+0x223/0x3c0 mm/slub.c:4216
 kmalloc_reserve+0x18b/0x2c0 net/core/skbuff.c:515
 pskb_expand_head+0x237/0x1050 net/core/skbuff.c:2185
 __skb_cow include/linux/skbuff.h:3769 [inline]
 skb_cow_head include/linux/skbuff.h:3803 [inline]
 batadv_skb_head_push+0xf5/0x290 net/batman-adv/soft-interface.c:72
 batadv_interface_tx+0x11e2/0x1b70 net/batman-adv/soft-interface.c:336
 __netdev_start_xmit include/linux/netdevice.h:5151 [inline]
 netdev_start_xmit include/linux/netdevice.h:5160 [inline]
 xmit_one net/core/dev.c:3800 [inline]
 dev_hard_start_xmit+0x9a/0x7b0 net/core/dev.c:3816
 __dev_queue_xmit+0x7f0/0x43e0 net/core/dev.c:4652
 dev_queue_xmit include/linux/netdevice.h:3313 [inline]
 br_dev_queue_push_xmit+0x274/0x8a0 net/bridge/br_forward.c:53
 NF_HOOK include/linux/netfilter.h:314 [inline]
 NF_HOOK include/linux/netfilter.h:308 [inline]
 br_forward_finish+0xf5/0x130 net/bridge/br_forward.c:66
 br_nf_hook_thresh+0x303/0x410 net/bridge/br_netfilter_hooks.c:1170
 br_nf_forward_finish+0x66a/0xba0 net/bridge/br_netfilter_hooks.c:665
 NF_HOOK include/linux/netfilter.h:314 [inline]
 NF_HOOK include/linux/netfilter.h:308 [inline]
 br_nf_forward_arp net/bridge/br_netfilter_hooks.c:755 [inline]
 br_nf_forward+0x16da/0x1bd0 net/bridge/br_netfilter_hooks.c:778
 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
 nf_hook_slow+0xbb/0x200 net/netfilter/core.c:626
 nf_hook+0x474/0x7d0 include/linux/netfilter.h:269
 NF_HOOK include/linux/netfilter.h:312 [inline]
 __br_forward+0x1be/0x5b0 net/bridge/br_forward.c:115
 deliver_clone+0x5b/0xa0 net/bridge/br_forward.c:131
 maybe_deliver+0xa7/0x120 net/bridge/br_forward.c:190
 br_flood+0x17b/0x5e0 net/bridge/br_forward.c:237
 br_handle_frame_finish+0xea2/0x1c90 net/bridge/br_input.c:220
 nf_hook_bridge_pre net/bridge/br_input.c:304 [inline]
 br_handle_frame+0xd90/0x14a0 net/bridge/br_input.c:433
 __netif_receive_skb_core.constprop.0+0xa20/0x4330 net/core/dev.c:5790
 __netif_receive_skb_one_core+0xb1/0x1e0 net/core/dev.c:5894
 __netif_receive_skb+0x1d/0x160 net/core/dev.c:6009
 process_backlog+0x443/0x15f0 net/core/dev.c:6357
 __napi_poll.constprop.0+0xb7/0x550 net/core/dev.c:7191
 napi_poll net/core/dev.c:7260 [inline]
 net_rx_action+0xa94/0x1010 net/core/dev.c:7382
 handle_softirqs+0x213/0x8f0 kernel/softirq.c:561
 __do_softirq kernel/softirq.c:595 [inline]
 invoke_softirq kernel/softirq.c:435 [inline]
 __irq_exit_rcu+0x109/0x170 kernel/softirq.c:662
 irq_exit_rcu+0x9/0x30 kernel/softirq.c:678
 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline]
 sysvec_apic_timer_interrupt+0xa4/0xc0 arch/x86/kernel/apic/apic.c:1049
 </IRQ>
 <TASK>
 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:__phys_addr+0xa/0x150 arch/x86/mm/physaddr.c:16
Code: da 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 41 54 45 31 e4 55 <bd> 00 00 00 80 53 48 89 fb e8 88 1d 4f 00 48 01 dd 48 89 df 41 0f
RSP: 0018:ffffc900025df868 EFLAGS: 00000246
RAX: ffff88801da9d640 RBX: 0000000000000000 RCX: 0000000000130006
RDX: 0000000000130007 RSI: ffffea0000e0d100 RDI: ffff8880373a0dc0
RBP: ffff8880373a0dc0 R08: ffff888038346700 R09: 0000000000130006
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000000 R14: ffffc900025df8b8 R15: ffff888038346700
 virt_to_folio include/linux/mm.h:1295 [inline]
 virt_to_slab mm/slab.h:211 [inline]
 qlink_to_cache mm/kasan/quarantine.c:131 [inline]
 qlist_free_all+0x66/0x120 mm/kasan/quarantine.c:176
 kasan_quarantine_reduce+0x195/0x1e0 mm/kasan/quarantine.c:286
 __kasan_slab_alloc+0x69/0x90 mm/kasan/common.c:329
 kasan_slab_alloc include/linux/kasan.h:250 [inline]
 slab_post_alloc_hook mm/slub.c:4115 [inline]
 slab_alloc_node mm/slub.c:4164 [inline]
 __kmalloc_cache_noprof+0x243/0x410 mm/slub.c:4320
 kmalloc_noprof include/linux/slab.h:901 [inline]
 kzalloc_noprof include/linux/slab.h:1037 [inline]
 keypair_create drivers/net/wireguard/noise.c:100 [inline]
 wg_noise_handshake_begin_session+0xe5/0xe80 drivers/net/wireguard/noise.c:827
 wg_packet_send_handshake_response+0x218/0x310 drivers/net/wireguard/send.c:96
 wg_receive_handshake_packet+0x248/0xbf0 drivers/net/wireguard/receive.c:154
 wg_packet_handshake_receive_worker+0x17f/0x3a0 drivers/net/wireguard/receive.c:213
 process_one_work+0x9c5/0x1ba0 kernel/workqueue.c:3238
 process_scheduled_works kernel/workqueue.c:3319 [inline]
 worker_thread+0x6c8/0xf00 kernel/workqueue.c:3400
 kthread+0x3af/0x750 kernel/kthread.c:464
 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:148
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 </TASK>
bridge0: received packet on veth0_to_bridge with own address as source address (addr:b6:66:51:3b:69:e4, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:b6:66:51:3b:69:e4, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:b6:66:51:3b:69:e4, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:b6:66:51:3b:69:e4, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:b6:66:51:3b:69:e4, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:b6:66:51:3b:69:e4, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:b6:66:51:3b:69:e4, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:b6:66:51:3b:69:e4, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:b6:66:51:3b:69:e4, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:b6:66:51:3b:69:e4, vlan:0)