bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:0e:13:c7:b2:dc, vlan:0)
rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P5217/1:b..l
rcu: (detected by 0, t=10502 jiffies, g=31477, q=388 ncpus=1)
task:udevd state:R running task stack:24664 pid:5217 tgid:5217 ppid:1 task_flags:0x400140 flags:0x00004002
Call Trace:
context_switch kernel/sched/core.c:5401 [inline]
__schedule+0x116a/0x5de0 kernel/sched/core.c:6790
preempt_schedule_irq+0x51/0x90 kernel/sched/core.c:7113
irqentry_exit+0x36/0x90 kernel/entry/common.c:307
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:lock_is_held_type+0x107/0x150 kernel/locking/lockdep.c:5948
Code: 00 00 b8 ff ff ff ff 65 0f c1 05 cc e0 4b 08 83 f8 01 75 2d 9c 58 f6 c4 02 75 43 48 f7 04 24 00 02 00 00 74 01 fb 48 83 c4 08 <44> 89 e8 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc 45 31 ed eb
RSP: 0018:ffffc90002f378f8 EFLAGS: 00000282
RAX: 0000000000000046 RBX: ffff88807cd10b18 RCX: 0000000000000001
RDX: 0000000000000000 RSI: ffffffff8de05908 RDI: ffffffff8c157060
RBP: ffffffff8e5c47c0 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000001 R12: ffff88807cd10000
R13: 0000000000000001 R14: 00000000ffffffff R15: 0000000000000001
kernfs_root+0x18e/0x2a0 fs/kernfs/kernfs-internal.h:76
kernfs_root_is_locked fs/kernfs/kernfs-internal.h:109 [inline]
kernfs_parent fs/kernfs/kernfs-internal.h:133 [inline]
kernfs_dop_revalidate+0x4a0/0x740 fs/kernfs/dir.c:1186
d_revalidate fs/namei.c:929 [inline]
d_revalidate fs/namei.c:925 [inline]
lookup_fast+0x266/0x610 fs/namei.c:1778
walk_component+0x5b/0x5b0 fs/namei.c:2134
link_path_walk+0x627/0xe20 fs/namei.c:2506
path_lookupat+0x15a/0x6d0 fs/namei.c:2662
filename_lookup+0x224/0x5f0 fs/namei.c:2692
vfs_statx+0x101/0x3e0 fs/stat.c:353
vfs_fstatat+0x7b/0xf0 fs/stat.c:375
__do_sys_newfstatat+0x97/0x120 fs/stat.c:542
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xcd/0x490 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f9e0c911b0a
RSP: 002b:00007ffe54971f08 EFLAGS: 00000246 ORIG_RAX: 0000000000000106
RAX: ffffffffffffffda RBX: 00007ffe549723a0 RCX: 00007f9e0c911b0a
RDX: 00007ffe54971f10 RSI: 00007ffe549723a0 RDI: 00000000ffffff9c
RBP: 000055eddf94e910 R08: 0000000000000000 R09: 0000000000000001
R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe54971fa0
R13: 0000000000000100 R14: 000055edca7eabe0 R15: 00007ffe54972a20
rcu: rcu_preempt kthread starved for 560 jiffies! g31477 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0
rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt state:R running task stack:28648 pid:16 tgid:16 ppid:2 task_flags:0x208040 flags:0x00004000
Call Trace:
context_switch kernel/sched/core.c:5401 [inline]
__schedule+0x116a/0x5de0 kernel/sched/core.c:6790
__schedule_loop kernel/sched/core.c:6868 [inline]
schedule+0xe7/0x3a0 kernel/sched/core.c:6883
schedule_timeout+0x123/0x290 kernel/time/sleep_timeout.c:99
rcu_gp_fqs_loop+0x1ea/0xb00 kernel/rcu/tree.c:2054
rcu_gp_kthread+0x270/0x380 kernel/rcu/tree.c:2256
kthread+0x3c5/0x780 kernel/kthread.c:464
ret_from_fork+0x5d4/0x6f0 arch/x86/kernel/process.c:148
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
rcu: Stack dump where RCU GP kthread last ran:
CPU: 0 UID: 0 PID: 7108 Comm: kworker/u8:45 Not tainted 6.16.0-rc5-syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
Workqueue: wg-kex-wg1 wg_packet_handshake_send_worker
RIP: 0010:lock_acquire+0x62/0x350 kernel/locking/lockdep.c:5875
Code: c7 37 12 83 f8 07 0f 87 bc 02 00 00 89 c0 48 0f a3 05 02 86 11 0f 0f 82 74 02 00 00 8b 35 ca b7 11 0f 85 f6 0f 85 8d 00 00 00 <48> 8b 44 24 30 65 48 2b 05 99 c7 37 12 0f 85 c7 02 00 00 48 83 c4
RSP: 0018:ffffc90000006bf0 EFLAGS: 00000206
RAX: 0000000000000046 RBX: ffffffff8e5c47c0 RCX: 000000007938eb5a
RDX: 0000000000000000 RSI: ffffffff8de05908 RDI: ffffffff8c157060
RBP: 0000000000000002 R08: 39529a686290c103 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
FS: 0000000000000000(0000) GS:ffff888124723000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055eddf957a48 CR3: 000000000e382000 CR4: 00000000003526f0
Call Trace:
rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
rcu_read_lock include/linux/rcupdate.h:841 [inline]
class_rcu_constructor include/linux/rcupdate.h:1155 [inline]
unwind_next_frame+0xd1/0x20a0 arch/x86/kernel/unwind_orc.c:479
arch_stack_walk+0x94/0x100 arch/x86/kernel/stacktrace.c:25
stack_trace_save+0x8e/0xc0 kernel/stacktrace.c:122
kasan_save_stack+0x33/0x60 mm/kasan/common.c:47
kasan_save_track+0x14/0x30 mm/kasan/common.c:68
unpoison_slab_object mm/kasan/common.c:319 [inline]
__kasan_slab_alloc+0x89/0x90 mm/kasan/common.c:345
kasan_slab_alloc include/linux/kasan.h:250 [inline]
slab_post_alloc_hook mm/slub.c:4148 [inline]
slab_alloc_node mm/slub.c:4197 [inline]
kmem_cache_alloc_noprof+0x1cb/0x3b0 mm/slub.c:4204
skb_ext_maybe_cow net/core/skbuff.c:6995 [inline]
skb_ext_add+0xf8/0x7a0 net/core/skbuff.c:7069
nf_bridge_unshare net/bridge/br_netfilter_hooks.c:169 [inline]
br_nf_forward_ip.part.0+0x28/0x810 net/bridge/br_netfilter_hooks.c:684
br_nf_forward_ip net/bridge/br_netfilter_hooks.c:679 [inline]
br_nf_forward+0xf0f/0x1be0 net/bridge/br_netfilter_hooks.c:776
nf_hook_entry_hookfn include/linux/netfilter.h:157 [inline]
nf_hook_slow+0xbb/0x200 net/netfilter/core.c:623
nf_hook+0x45e/0x780 include/linux/netfilter.h:272
NF_HOOK include/linux/netfilter.h:315 [inline]
__br_forward+0x1be/0x5b0 net/bridge/br_forward.c:115
deliver_clone net/bridge/br_forward.c:131 [inline]
maybe_deliver+0xf1/0x180 net/bridge/br_forward.c:190
br_flood+0x17c/0x650 net/bridge/br_forward.c:237
br_handle_frame_finish+0xf2d/0x1ca0 net/bridge/br_input.c:221
br_nf_hook_thresh+0x304/0x410 net/bridge/br_netfilter_hooks.c:1170
br_nf_pre_routing_finish_ipv6+0x76a/0xfb0 net/bridge/br_netfilter_ipv6.c:154
NF_HOOK include/linux/netfilter.h:317 [inline]
br_nf_pre_routing_ipv6+0x3cd/0x8c0 net/bridge/br_netfilter_ipv6.c:184
br_nf_pre_routing+0x860/0x15b0 net/bridge/br_netfilter_hooks.c:508
nf_hook_entry_hookfn include/linux/netfilter.h:157 [inline]
nf_hook_bridge_pre net/bridge/br_input.c:283 [inline]
br_handle_frame+0xad8/0x14b0 net/bridge/br_input.c:434
__netif_receive_skb_core.constprop.0+0xa23/0x4a00 net/core/dev.c:5863
__netif_receive_skb_one_core+0xb0/0x1e0 net/core/dev.c:5975
__netif_receive_skb+0x1d/0x160 net/core/dev.c:6090
process_backlog+0x442/0x15e0 net/core/dev.c:6442
__napi_poll.constprop.0+0xb7/0x550 net/core/dev.c:7414
napi_poll net/core/dev.c:7478 [inline]
net_rx_action+0xa9f/0xfe0 net/core/dev.c:7605
handle_softirqs+0x216/0x8e0 kernel/softirq.c:579
do_softirq kernel/softirq.c:480 [inline]
do_softirq+0xb2/0xf0 kernel/softirq.c:467
__local_bh_enable_ip+0x100/0x120 kernel/softirq.c:407
local_bh_enable include/linux/bottom_half.h:33 [inline]
fpregs_unlock arch/x86/include/asm/fpu/api.h:77 [inline]
kernel_fpu_end+0x5e/0x70 arch/x86/kernel/fpu/core.c:476
blake2s_compress+0x7f/0xe0 arch/x86/lib/crypto/blake2s-glue.c:46
blake2s_update+0xef/0x360 lib/crypto/blake2s.c:32
hmac.constprop.0+0x32a/0x420 drivers/net/wireguard/noise.c:332
kdf.constprop.0+0x122/0x280 drivers/net/wireguard/noise.c:360
message_ephemeral+0x5f/0x70 drivers/net/wireguard/noise.c:493
wg_noise_handshake_create_initiation+0x2c6/0x650 drivers/net/wireguard/noise.c:545
wg_packet_send_handshake_initiation+0x19a/0x360 drivers/net/wireguard/send.c:34
wg_packet_handshake_send_worker+0x1c/0x30 drivers/net/wireguard/send.c:51
process_one_work+0x9cc/0x1b70 kernel/workqueue.c:3238
process_scheduled_works kernel/workqueue.c:3321 [inline]
worker_thread+0x6c8/0xf10 kernel/workqueue.c:3402
kthread+0x3c5/0x780 kernel/kthread.c:464
ret_from_fork+0x5d4/0x6f0 arch/x86/kernel/process.c:148
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
net_ratelimit: 6293 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:0e:13:c7:b2:dc, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:0e:13:c7:b2:dc, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
net_ratelimit: 9131 callbacks suppressed
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:0e:13:c7:b2:dc, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:0e:13:c7:b2:dc, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:0e:13:c7:b2:dc, vlan:0)