INFO: task kworker/0:0:9 blocked for more than 150 seconds. Tainted: G L syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:26072 pid:9 tgid:9 ppid:2 task_flags:0x4208060 flags:0x00080000 Workqueue: events switchdev_deferred_process_work Call Trace: context_switch kernel/sched/core.c:5295 [inline] __schedule+0xfee/0x6120 kernel/sched/core.c:6908 __schedule_loop kernel/sched/core.c:6990 [inline] schedule+0xdd/0x390 kernel/sched/core.c:7005 schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:7062 __mutex_lock_common kernel/locking/mutex.c:692 [inline] __mutex_lock+0xc9a/0x1b90 kernel/locking/mutex.c:776 switchdev_deferred_process_work+0xe/0x20 net/switchdev/switchdev.c:104 process_one_work+0x9d7/0x1920 kernel/workqueue.c:3275 process_scheduled_works kernel/workqueue.c:3358 [inline] worker_thread+0x5da/0xe40 kernel/workqueue.c:3439 kthread+0x370/0x450 kernel/kthread.c:436 ret_from_fork+0x754/0xd80 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 INFO: task syz.3.1863:14450 blocked for more than 150 seconds. Tainted: G L syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz.3.1863 state:D stack:25816 pid:14450 tgid:14449 ppid:5874 task_flags:0x400140 flags:0x00080002 Call Trace: context_switch kernel/sched/core.c:5295 [inline] __schedule+0xfee/0x6120 kernel/sched/core.c:6908 __schedule_loop kernel/sched/core.c:6990 [inline] schedule+0xdd/0x390 kernel/sched/core.c:7005 schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:7062 __mutex_lock_common kernel/locking/mutex.c:692 [inline] __mutex_lock+0xc9a/0x1b90 kernel/locking/mutex.c:776 ppp_create_interface drivers/net/ppp/ppp_generic.c:3392 [inline] ppp_unattached_ioctl drivers/net/ppp/ppp_generic.c:1065 [inline] ppp_ioctl+0x972/0x2800 drivers/net/ppp/ppp_generic.c:738 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:597 [inline] __se_sys_ioctl fs/ioctl.c:583 [inline] __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:583 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x106/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f4f5619c799 RSP: 002b:00007f4f570ab028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f4f56415fa0 RCX: 00007f4f5619c799 RDX: 0000000000000000 RSI: 00000000c004743e RDI: 0000000000000002 RBP: 00007f4f56232c99 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f4f56416038 R14: 00007f4f56415fa0 R15: 00007fffd8728748 Showing all locks held in the system: 3 locks held by init/1: 3 locks held by kworker/0:0/9: #0: ffff88813fe63148 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x1287/0x1920 kernel/workqueue.c:3250 #1: ffffc900000e7d08 (deferred_process_work){+.+.}-{0:0}, at: process_one_work+0x93c/0x1920 kernel/workqueue.c:3251 #2: ffffffff906134a8 (rtnl_mutex){+.+.}-{4:4}, at: switchdev_deferred_process_work+0xe/0x20 net/switchdev/switchdev.c:104 1 lock held by kworker/R-mm_pe/14: 1 lock held by khungtaskd/30: #0: ffffffff8e7e7460 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:312 [inline] #0: ffffffff8e7e7460 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:850 [inline] #0: ffffffff8e7e7460 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x3d/0x184 kernel/locking/lockdep.c:6775 3 locks held by kworker/1:1/47: 2 locks held by kswapd0/86: 2 locks held by kworker/0:2/796: 1 lock held by kworker/R-mld/3182: #0: ffffffff8e694d48 (wq_pool_attach_mutex){+.+.}-{4:4}, at: worker_detach_from_pool kernel/workqueue.c:2749 [inline] #0: ffffffff8e694d48 (wq_pool_attach_mutex){+.+.}-{4:4}, at: rescuer_thread+0xb78/0x1490 kernel/workqueue.c:3610 2 locks held by udevd/5192: 2 locks held by dhcpcd/5486: 1 lock held by crond/5565: 2 locks held by syz-executor/5851: 4 locks held by kworker/1:0/5868: 2 locks held by udevd/5873: 1 lock held by kworker/R-wg-cr/5890: #0: ffffffff8e694d48 (wq_pool_attach_mutex){+.+.}-{4:4}, at: worker_attach_to_pool+0x27/0x420 kernel/workqueue.c:2691 1 lock held by kworker/R-wg-cr/5891: 1 lock held by kworker/R-wg-cr/5892: #0: ffffffff8e694d48 (wq_pool_attach_mutex){+.+.}-{4:4}, at: worker_attach_to_pool+0x27/0x420 kernel/workqueue.c:2691 1 lock held by kworker/R-wg-cr/5894: #0: ffffffff8e694d48 (wq_pool_attach_mutex){+.+.}-{4:4}, at: worker_detach_from_pool kernel/workqueue.c:2749 [inline] #0: ffffffff8e694d48 (wq_pool_attach_mutex){+.+.}-{4:4}, at: rescuer_thread+0xb78/0x1490 kernel/workqueue.c:3610 1 lock held by kworker/R-wg-cr/5896: #0: ffffffff8e694d48 (wq_pool_attach_mutex){+.+.}-{4:4}, at: worker_attach_to_pool+0x27/0x420 kernel/workqueue.c:2691 1 lock held by kworker/R-wg-cr/5897: #0: ffffffff8e694d48 (wq_pool_attach_mutex){+.+.}-{4:4}, at: worker_detach_from_pool kernel/workqueue.c:2749 [inline] #0: ffffffff8e694d48 (wq_pool_attach_mutex){+.+.}-{4:4}, at: rescuer_thread+0xb78/0x1490 kernel/workqueue.c:3610 1 lock held by kworker/R-wg-cr/5898: #0: ffffffff8e694d48 (wq_pool_attach_mutex){+.+.}-{4:4}, at: worker_attach_to_pool+0x27/0x420 kernel/workqueue.c:2691 1 lock held by kworker/R-wg-cr/5900: #0: ffffffff8e694d48 (wq_pool_attach_mutex){+.+.}-{4:4}, at: worker_detach_from_pool kernel/workqueue.c:2749 [inline] #0: ffffffff8e694d48 (wq_pool_attach_mutex){+.+.}-{4:4}, at: rescuer_thread+0xb78/0x1490 kernel/workqueue.c:3610 3 locks held by kworker/1:3/5908: 4 locks held by kworker/1:6/5971: #0: ffff88805ccf5948 ((wq_completion)wg-kex-wg2#8){+.+.}-{0:0}, at: process_one_work+0x1287/0x1920 kernel/workqueue.c:3250 #1: ffffc90004497d08 ((work_completion)(&({ do { const void __seg_gs *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __asm__ ("" : "=r"(__ptr) : "0"((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_one_work+0x93c/0x1920 kernel/workqueue.c:3251 #2: ffff88802ae5d348 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_consume_initiation+0x1c2/0x860 drivers/net/wireguard/noise.c:598 #3: ffff88807b401708 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_consume_initiation+0x5ac/0x860 drivers/net/wireguard/noise.c:632 4 locks held by kworker/u10:0/6461: 2 locks held by kworker/u10:2/6466: 4 locks held by kworker/u10:3/6469: 4 locks held by kworker/u10:4/6472: 3 locks held by kworker/u10:5/6509: 5 locks held by kworker/u10:7/7565: 3 locks held by kworker/u10:8/9788: 4 locks held by kworker/u10:9/9934: 4 locks held by kworker/u10:10/9936: 4 locks held by kworker/u10:11/9937: 3 locks held by kworker/u10:12/9938: 4 locks held by kworker/u10:13/9939: 4 locks held by kworker/u10:14/9940: 4 locks held by kworker/u10:15/9941: 4 locks held by kworker/u10:16/9944: #0: ffff88801c6ae948 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x1287/0x1920 kernel/workqueue.c:3250 #1: ffffc90004437d08 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x93c/0x1920 kernel/workqueue.c:3251 #2: ffffffff905fac50 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0xb8/0x920 net/core/net_namespace.c:675 #3: ffffffff906134a8 (rtnl_mutex){+.+.}-{4:4}, at: wg_netns_pre_exit+0x1b/0x250 drivers/net/wireguard/device.c:419 4 locks held by kworker/u10:17/9945: 3 locks held by kworker/u10:18/12809: 4 locks held by kworker/u10:19/12810: 4 locks held by kworker/u10:20/12811: 3 locks held by kworker/u10:21/12812: 2 locks held by kworker/u10:22/12813: 2 locks held by kworker/u10:23/12814: 3 locks held by kworker/u10:24/12815: 3 locks held by kworker/u10:25/12818: 3 locks held by kworker/u10:26/13179: #0: ffff888032210948 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x1287/0x1920 kernel/workqueue.c:3250 #1: ffffc90005b4fd08 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_one_work+0x93c/0x1920 kernel/workqueue.c:3251 #2: ffffffff906134a8 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_net_lock include/linux/rtnetlink.h:130 [inline] #2: ffffffff906134a8 (rtnl_mutex){+.+.}-{4:4}, at: addrconf_verify_work+0x12/0x30 net/ipv6/addrconf.c:4738 3 locks held by kworker/u10:27/13180: 3 locks held by kworker/u10:30/13183: 3 locks held by kworker/u10:32/13185: 3 locks held by kworker/u10:35/13190: 3 locks held by kworker/u10:36/13191: 3 locks held by syz.0.1861/14443: 3 locks held by syz.2.1862/14446: 6 locks held by syz.2.1862/14448: 2 locks held by syz.3.1863/14450: #0: ffffffff8fa12b48 (ppp_mutex){+.+.}-{4:4}, at: ppp_ioctl+0xc2/0x2800 drivers/net/ppp/ppp_generic.c:734 #1: ffffffff906134a8 (rtnl_mutex){+.+.}-{4:4}, at: ppp_create_interface drivers/net/ppp/ppp_generic.c:3392 [inline] #1: ffffffff906134a8 (rtnl_mutex){+.+.}-{4:4}, at: ppp_unattached_ioctl drivers/net/ppp/ppp_generic.c:1065 [inline] #1: ffffffff906134a8 (rtnl_mutex){+.+.}-{4:4}, at: ppp_ioctl+0x972/0x2800 drivers/net/ppp/ppp_generic.c:738 1 lock held by kworker/1:2/14453: #0: ffffffff8e694d48 (wq_pool_attach_mutex){+.+.}-{4:4}, at: worker_attach_to_pool+0x27/0x420 kernel/workqueue.c:2691 ============================================= NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 30 Comm: khungtaskd Tainted: G L syzkaller #0 PREEMPT(full) Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/27/2026 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x100/0x190 lib/dump_stack.c:120 nmi_cpu_backtrace.cold+0x12d/0x151 lib/nmi_backtrace.c:113 nmi_trigger_cpumask_backtrace+0x1d7/0x230 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:161 [inline] __sys_info lib/sys_info.c:157 [inline] sys_info+0x141/0x190 lib/sys_info.c:165 check_hung_uninterruptible_tasks kernel/hung_task.c:346 [inline] watchdog+0xd25/0x1050 kernel/hung_task.c:515 kthread+0x370/0x450 kernel/kthread.c:436 ret_from_fork+0x754/0xd80 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT(full) Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/27/2026 RIP: 0010:lockdep_enabled kernel/locking/lockdep.c:124 [inline] RIP: 0010:lock_release+0x75/0x320 kernel/locking/lockdep.c:5881 Code: f5 0e 45 85 c0 0f 84 48 01 00 00 65 8b 05 eb 14 29 12 85 c0 0f 85 39 01 00 00 65 4c 8b 25 6b cd 28 12 41 8b bc 24 54 0b 00 00 <85> ff 0f 85 21 01 00 00 48 81 3b 40 07 14 94 0f 84 14 01 00 00 9c RSP: 0018:ffffc90000006ee0 EFLAGS: 00000246 RAX: 0000000000000000 RBX: ffffffff8e7e7460 RCX: 0000000000000001 RDX: 0000000000000000 RSI: ffffffff8c1af920 RDI: 0000000000000000 RBP: ffffffff81f1fa48 R08: 0000000000000001 R09: 0000000000000007 R10: 0000000000000200 R11: 0000000000000000 R12: ffffffff8e4975c0 R13: ffffc90000007048 R14: 0000000000000000 R15: ffffffff8e4975c0 FS: 0000000000000000(0000) GS:ffff88812434d000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000001ad70 CR3: 000000000e598000 CR4: 00000000003526f0 Call Trace: rcu_lock_release include/linux/rcupdate.h:322 [inline] rcu_read_unlock include/linux/rcupdate.h:881 [inline] class_rcu_destructor include/linux/rcupdate.h:1193 [inline] is_module_text_address+0x14d/0x220 kernel/module/main.c:3857 kernel_text_address kernel/extable.c:119 [inline] kernel_text_address+0x81/0x100 kernel/extable.c:94 __kernel_text_address+0xd/0x30 kernel/extable.c:79 unwind_get_return_address+0x59/0xa0 arch/x86/kernel/unwind_orc.c:385 arch_stack_walk+0xa6/0xf0 arch/x86/kernel/stacktrace.c:26 stack_trace_save+0x8e/0xc0 kernel/stacktrace.c:122 kasan_save_stack+0x30/0x50 mm/kasan/common.c:57 kasan_save_track+0x14/0x30 mm/kasan/common.c:78 unpoison_slab_object mm/kasan/common.c:340 [inline] __kasan_slab_alloc+0x89/0x90 mm/kasan/common.c:366 kasan_slab_alloc include/linux/kasan.h:253 [inline] slab_post_alloc_hook mm/slub.c:4542 [inline] slab_alloc_node mm/slub.c:4869 [inline] kmem_cache_alloc_noprof+0x241/0x6e0 mm/slub.c:4876 skb_clone+0x190/0x400 net/core/skbuff.c:2120 deliver_clone net/bridge/br_forward.c:125 [inline] br_flood+0x35c/0x650 net/bridge/br_forward.c:250 br_handle_frame_finish+0xff0/0x1f60 net/bridge/br_input.c:229 br_nf_hook_thresh+0x30d/0x420 net/bridge/br_netfilter_hooks.c:1167 br_nf_pre_routing_finish_ipv6+0x769/0xfb0 net/bridge/br_netfilter_ipv6.c:154 NF_HOOK include/linux/netfilter.h:318 [inline] br_nf_pre_routing_ipv6+0x39c/0x8b0 net/bridge/br_netfilter_ipv6.c:184 br_nf_pre_routing+0x93b/0x1510 net/bridge/br_netfilter_hooks.c:508 nf_hook_entry_hookfn include/linux/netfilter.h:158 [inline] nf_hook_bridge_pre net/bridge/br_input.c:291 [inline] br_handle_frame+0xcdd/0x1520 net/bridge/br_input.c:442 __netif_receive_skb_core.constprop.0+0x6c5/0x3550 net/core/dev.c:6051 __netif_receive_skb_one_core+0xb0/0x1e0 net/core/dev.c:6162 __netif_receive_skb+0x1f/0x120 net/core/dev.c:6277 process_backlog+0x37a/0x1580 net/core/dev.c:6628 __napi_poll.constprop.0+0xaf/0x450 net/core/dev.c:7692 napi_poll net/core/dev.c:7755 [inline] net_rx_action+0xa40/0xf20 net/core/dev.c:7912 handle_softirqs+0x1eb/0x9e0 kernel/softirq.c:622 __do_softirq kernel/softirq.c:656 [inline] invoke_softirq kernel/softirq.c:496 [inline] __irq_exit_rcu+0xef/0x150 kernel/softirq.c:723 irq_exit_rcu+0x9/0x30 kernel/softirq.c:739 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1056 [inline] sysvec_apic_timer_interrupt+0xa3/0xc0 arch/x86/kernel/apic/apic.c:1056 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 RIP: 0010:pv_native_safe_halt+0xf/0x20 arch/x86/kernel/paravirt.c:63 Code: d8 85 02 c3 cc cc cc cc 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 66 90 0f 00 2d a3 8f 1e 00 fb f4 fc 35 03 00 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90 RSP: 0018:ffffffff8e407e00 EFLAGS: 00000242 RAX: 00000000003b748f RBX: ffffffff8e4975c0 RCX: ffffffff8b8cfc75 RDX: 0000000000000000 RSI: ffffffff8de7d6cd RDI: ffffffff8c1af9a0 RBP: 0000000000000000 R08: 0000000000000001 R09: ffffed1017086795 R10: ffff8880b8433cab R11: 0000000000000000 R12: fffffbfff1c92eb8 R13: 0000000000000000 R14: ffffffff90d9ae10 R15: 0000000000000000 arch_safe_halt arch/x86/include/asm/paravirt.h:73 [inline] default_idle+0x9/0x10 arch/x86/kernel/process.c:767 default_idle_call+0x6c/0xb0 kernel/sched/idle.c:122 cpuidle_idle_call kernel/sched/idle.c:191 [inline] do_idle+0x35b/0x4b0 kernel/sched/idle.c:332 cpu_startup_entry+0x4f/0x60 kernel/sched/idle.c:430 rest_init+0x251/0x260 init/main.c:760 start_kernel+0x47f/0x480 init/main.c:1210 x86_64_start_reservations+0x24/0x30 arch/x86/kernel/head64.c:310 x86_64_start_kernel+0x12b/0x130 arch/x86/kernel/head64.c:291 common_startup_64+0x13e/0x148 net_ratelimit: 20179 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:eb:53:eb:83:e2, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:eb:53:eb:83:e2, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:eb:53:eb:83:e2, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) net_ratelimit: 20807 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:eb:53:eb:83:e2, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:eb:53:eb:83:e2, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:eb:53:eb:83:e2, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) net_ratelimit: 20094 callbacks suppressed bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:eb:53:eb:83:e2, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:eb:53:eb:83:e2, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:eb:53:eb:83:e2, vlan:0) net_ratelimit: 20083 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:eb:53:eb:83:e2, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:eb:53:eb:83:e2, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:eb:53:eb:83:e2, vlan:0) net_ratelimit: 19812 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:eb:53:eb:83:e2, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:eb:53:eb:83:e2, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:eb:53:eb:83:e2, vlan:0) net_ratelimit: 19959 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:eb:53:eb:83:e2, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) net_ratelimit: 19714 callbacks suppressed bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:eb:53:eb:83:e2, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:eb:53:eb:83:e2, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:eb:53:eb:83:e2, vlan:0) net_ratelimit: 20279 callbacks suppressed bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:eb:53:eb:83:e2, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:eb:53:eb:83:e2, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) net_ratelimit: 20203 callbacks suppressed bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) net_ratelimit: 20110 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:eb:53:eb:83:e2, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:eb:53:eb:83:e2, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:eb:53:eb:83:e2, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) net_ratelimit: 20056 callbacks suppressed bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:eb:53:eb:83:e2, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:eb:53:eb:83:e2, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:eb:53:eb:83:e2, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:4e:eb:53:eb:83:e2, vlan:0)