bridge0: entered promiscuous mode vlan2: entered promiscuous mode BUG: sleeping function called from invalid context at kernel/locking/mutex.c:575 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 17700, name: syz.5.4230 preempt_count: 201, expected: 0 RCU nest depth: 0, expected: 0 3 locks held by syz.5.4230/17700: #0: ffffffff8f9e6e48 (&ops->srcu#2){.+.+}-{0:0}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline] #0: ffffffff8f9e6e48 (&ops->srcu#2){.+.+}-{0:0}, at: rcu_read_lock include/linux/rcupdate.h:867 [inline] #0: ffffffff8f9e6e48 (&ops->srcu#2){.+.+}-{0:0}, at: rtnl_link_ops_get+0x23/0x250 net/core/rtnetlink.c:570 #1: ffffffff8f4e1888 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock net/core/rtnetlink.c:80 [inline] #1: ffffffff8f4e1888 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_nets_lock net/core/rtnetlink.c:341 [inline] #1: ffffffff8f4e1888 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0x8e9/0x1c80 net/core/rtnetlink.c:4064 #2: ffff888078cc0378 (&dev_addr_list_lock_key#6/2){+...}-{3:3}, at: netif_addr_lock_bh include/linux/netdevice.h:4850 [inline] #2: ffff888078cc0378 (&dev_addr_list_lock_key#6/2){+...}-{3:3}, at: dev_uc_add+0x67/0x120 net/core/dev_addr_lists.c:689 Preemption disabled at: [] local_bh_disable include/linux/bottom_half.h:20 [inline] [] netif_addr_lock_bh include/linux/netdevice.h:4849 [inline] [] dev_uc_add+0x56/0x120 net/core/dev_addr_lists.c:689 CPU: 0 UID: 0 PID: 17700 Comm: syz.5.4230 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 Call Trace: dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120 __might_resched+0x495/0x610 kernel/sched/core.c:8927 __mutex_lock_common kernel/locking/mutex.c:575 [inline] __mutex_lock+0x109/0x1350 kernel/locking/mutex.c:760 netdev_lock include/linux/netdevice.h:2768 [inline] netdev_lock_ops include/net/netdev_lock.h:42 [inline] dev_set_promiscuity+0x10e/0x260 net/core/dev_api.c:286 dev_change_rx_flags net/core/dev.c:9445 [inline] __dev_set_promiscuity+0x534/0x740 net/core/dev.c:9489 netif_set_promiscuity+0x50/0xe0 net/core/dev.c:9509 dev_set_promiscuity+0x126/0x260 net/core/dev_api.c:287 br_port_set_promisc net/bridge/br_if.c:108 [inline] br_manage_promisc+0x180/0x560 net/bridge/br_if.c:157 dev_change_rx_flags net/core/dev.c:9445 [inline] __dev_set_promiscuity+0x534/0x740 net/core/dev.c:9489 __dev_set_rx_mode+0x17c/0x260 net/core/dev.c:-1 dev_uc_add+0xc8/0x120 net/core/dev_addr_lists.c:693 macvlan_open+0x446/0x8e0 drivers/net/macvlan.c:647 __dev_open+0x470/0x880 net/core/dev.c:1682 __dev_change_flags+0x1ea/0x6d0 net/core/dev.c:9662 rtnl_configure_link net/core/rtnetlink.c:3587 [inline] rtnl_newlink_create+0x555/0xb00 net/core/rtnetlink.c:3843 __rtnl_newlink net/core/rtnetlink.c:3950 [inline] rtnl_newlink+0x16e4/0x1c80 net/core/rtnetlink.c:4065 rtnetlink_rcv_msg+0x7cf/0xb70 net/core/rtnetlink.c:6954 netlink_rcv_skb+0x208/0x470 net/netlink/af_netlink.c:2550 netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline] netlink_unicast+0x82f/0x9e0 net/netlink/af_netlink.c:1344 netlink_sendmsg+0x805/0xb30 net/netlink/af_netlink.c:1894 sock_sendmsg_nosec net/socket.c:727 [inline] __sock_sendmsg+0x21c/0x270 net/socket.c:742 ____sys_sendmsg+0x505/0x830 net/socket.c:2630 ___sys_sendmsg+0x21f/0x2a0 net/socket.c:2684 __sys_sendmsg net/socket.c:2716 [inline] __do_sys_sendmsg net/socket.c:2721 [inline] __se_sys_sendmsg net/socket.c:2719 [inline] __x64_sys_sendmsg+0x19b/0x260 net/socket.c:2719 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fa4be38eec9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fa4bf16d038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007fa4be5e5fa0 RCX: 00007fa4be38eec9 RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000004 RBP: 00007fa4be411f91 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fa4be5e6038 R14: 00007fa4be5e5fa0 R15: 00007ffc80423c68 ============================= [ BUG: Invalid wait context ] syzkaller #0 Tainted: G W ----------------------------- syz.5.4230/17700 is trying to lock: ffff88807ae0ed40 (&dev_instance_lock_key#3){+.+.}-{4:4}, at: netdev_lock include/linux/netdevice.h:2768 [inline] ffff88807ae0ed40 (&dev_instance_lock_key#3){+.+.}-{4:4}, at: netdev_lock_ops include/net/netdev_lock.h:42 [inline] ffff88807ae0ed40 (&dev_instance_lock_key#3){+.+.}-{4:4}, at: dev_set_promiscuity+0x10e/0x260 net/core/dev_api.c:286 other info that might help us debug this: context-{5:5} 3 locks held by syz.5.4230/17700: #0: ffffffff8f9e6e48 (&ops->srcu#2){.+.+}-{0:0}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline] #0: ffffffff8f9e6e48 (&ops->srcu#2){.+.+}-{0:0}, at: rcu_read_lock include/linux/rcupdate.h:867 [inline] #0: ffffffff8f9e6e48 (&ops->srcu#2){.+.+}-{0:0}, at: rtnl_link_ops_get+0x23/0x250 net/core/rtnetlink.c:570 #1: ffffffff8f4e1888 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock net/core/rtnetlink.c:80 [inline] #1: ffffffff8f4e1888 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_nets_lock net/core/rtnetlink.c:341 [inline] #1: ffffffff8f4e1888 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0x8e9/0x1c80 net/core/rtnetlink.c:4064 #2: ffff888078cc0378 (&dev_addr_list_lock_key#6/2){+...}-{3:3}, at: netif_addr_lock_bh include/linux/netdevice.h:4850 [inline] #2: ffff888078cc0378 (&dev_addr_list_lock_key#6/2){+...}-{3:3}, at: dev_uc_add+0x67/0x120 net/core/dev_addr_lists.c:689 stack backtrace: CPU: 0 UID: 0 PID: 17700 Comm: syz.5.4230 Tainted: G W syzkaller #0 PREEMPT(full) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 Call Trace: dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120 print_lock_invalid_wait_context kernel/locking/lockdep.c:4830 [inline] check_wait_context kernel/locking/lockdep.c:4902 [inline] __lock_acquire+0xbcb/0xd20 kernel/locking/lockdep.c:5187 lock_acquire+0x120/0x360 kernel/locking/lockdep.c:5868 __mutex_lock_common kernel/locking/mutex.c:598 [inline] __mutex_lock+0x187/0x1350 kernel/locking/mutex.c:760 netdev_lock include/linux/netdevice.h:2768 [inline] netdev_lock_ops include/net/netdev_lock.h:42 [inline] dev_set_promiscuity+0x10e/0x260 net/core/dev_api.c:286 dev_change_rx_flags net/core/dev.c:9445 [inline] __dev_set_promiscuity+0x534/0x740 net/core/dev.c:9489 netif_set_promiscuity+0x50/0xe0 net/core/dev.c:9509 dev_set_promiscuity+0x126/0x260 net/core/dev_api.c:287 br_port_set_promisc net/bridge/br_if.c:108 [inline] br_manage_promisc+0x180/0x560 net/bridge/br_if.c:157 dev_change_rx_flags net/core/dev.c:9445 [inline] __dev_set_promiscuity+0x534/0x740 net/core/dev.c:9489 __dev_set_rx_mode+0x17c/0x260 net/core/dev.c:-1 dev_uc_add+0xc8/0x120 net/core/dev_addr_lists.c:693 macvlan_open+0x446/0x8e0 drivers/net/macvlan.c:647 __dev_open+0x470/0x880 net/core/dev.c:1682 __dev_change_flags+0x1ea/0x6d0 net/core/dev.c:9662 rtnl_configure_link net/core/rtnetlink.c:3587 [inline] rtnl_newlink_create+0x555/0xb00 net/core/rtnetlink.c:3843 __rtnl_newlink net/core/rtnetlink.c:3950 [inline] rtnl_newlink+0x16e4/0x1c80 net/core/rtnetlink.c:4065 rtnetlink_rcv_msg+0x7cf/0xb70 net/core/rtnetlink.c:6954 netlink_rcv_skb+0x208/0x470 net/netlink/af_netlink.c:2550 netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline] netlink_unicast+0x82f/0x9e0 net/netlink/af_netlink.c:1344 netlink_sendmsg+0x805/0xb30 net/netlink/af_netlink.c:1894 sock_sendmsg_nosec net/socket.c:727 [inline] __sock_sendmsg+0x21c/0x270 net/socket.c:742 ____sys_sendmsg+0x505/0x830 net/socket.c:2630 ___sys_sendmsg+0x21f/0x2a0 net/socket.c:2684 __sys_sendmsg net/socket.c:2716 [inline] __do_sys_sendmsg net/socket.c:2721 [inline] __se_sys_sendmsg net/socket.c:2719 [inline] __x64_sys_sendmsg+0x19b/0x260 net/socket.c:2719 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fa4be38eec9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fa4bf16d038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007fa4be5e5fa0 RCX: 00007fa4be38eec9 RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000004 RBP: 00007fa4be411f91 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fa4be5e6038 R14: 00007fa4be5e5fa0 R15: 00007ffc80423c68 macvtap1: entered allmulticast mode bridge0: entered allmulticast mode batman_adv: batadv0: Adding interface: macvtap1 batman_adv: batadv0: The MTU of interface macvtap1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. batman_adv: batadv0: Interface activated: macvtap1