team0: left allmulticast mode
team_slave_0: left allmulticast mode
team_slave_1: left allmulticast mode
geneve0: left allmulticast mode
BUG: sleeping function called from invalid context at kernel/locking/mutex.c:562
in_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 8501, name: syz.1.777
preempt_count: 0, expected: 0
RCU nest depth: 1, expected: 0
2 locks held by syz.1.777/8501:
#0: ffffffff8fed6848 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock net/core/rtnetlink.c:79 [inline]
#0: ffffffff8fed6848 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_nets_lock net/core/rtnetlink.c:340 [inline]
#0: ffffffff8fed6848 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0xc4c/0x1d90 net/core/rtnetlink.c:4053
#1: ffffffff8eb392e0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:337 [inline]
#1: ffffffff8eb392e0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:849 [inline]
#1: ffffffff8eb392e0 (rcu_read_lock){....}-{1:3}, at: team_change_rx_flags+0x29/0x330 drivers/net/team/team_core.c:1780
CPU: 1 UID: 0 PID: 8501 Comm: syz.1.777 Not tainted 6.14.0-rc5-syzkaller-01140-ge2537326e3b6 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
__might_resched+0x5d4/0x780 kernel/sched/core.c:8767
__mutex_lock_common kernel/locking/mutex.c:562 [inline]
__mutex_lock+0x126/0x1010 kernel/locking/mutex.c:730
netdev_lock include/linux/netdevice.h:2765 [inline]
netdev_lock_ops include/linux/netdevice.h:2804 [inline]
dev_set_allmulti+0x11c/0x270 net/core/dev_api.c:277
team_change_rx_flags+0x1a8/0x330 drivers/net/team/team_core.c:1788
dev_change_rx_flags net/core/dev.c:9153 [inline]
netif_set_allmulti+0x20e/0x380 net/core/dev.c:9255
dev_set_allmulti+0x143/0x270 net/core/dev_api.c:278
nbp_delete_promisc net/bridge/br_if.c:252 [inline]
del_nbp+0xce/0xb40 net/bridge/br_if.c:340
br_del_if+0x145/0x320 net/bridge/br_if.c:739
do_set_master+0x349/0x730 net/core/rtnetlink.c:2926
do_setlink+0xfee/0x40f0 net/core/rtnetlink.c:3148
rtnl_changelink net/core/rtnetlink.c:3758 [inline]
__rtnl_newlink net/core/rtnetlink.c:3917 [inline]
rtnl_newlink+0x15a6/0x1d90 net/core/rtnetlink.c:4054
rtnetlink_rcv_msg+0x791/0xcf0 net/core/rtnetlink.c:6944
netlink_rcv_skb+0x206/0x480 net/netlink/af_netlink.c:2534
netlink_unicast_kernel net/netlink/af_netlink.c:1313 [inline]
netlink_unicast+0x7f6/0x990 net/netlink/af_netlink.c:1339
netlink_sendmsg+0x8de/0xcb0 net/netlink/af_netlink.c:1883
sock_sendmsg_nosec net/socket.c:709 [inline]
__sock_sendmsg+0x221/0x270 net/socket.c:724
____sys_sendmsg+0x53a/0x860 net/socket.c:2564
___sys_sendmsg net/socket.c:2618 [inline]
__sys_sendmsg+0x269/0x350 net/socket.c:2650
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f3fd8b8d169
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f3fd9a8c038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00007f3fd8da6080 RCX: 00007f3fd8b8d169
RDX: 0000000004040850 RSI: 0000400000000000 RDI: 000000000000000e
RBP: 00007f3fd8c0e2a0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007f3fd8da6080 R15: 00007ffd6f16a798
=============================
[ BUG: Invalid wait context ]
6.14.0-rc5-syzkaller-01140-ge2537326e3b6 #0 Tainted: G W
-----------------------------
syz.1.777/8501 is trying to lock:
ffff88805bda4d28 (&dev->lock){+.+.}-{4:4}, at: netdev_lock include/linux/netdevice.h:2765 [inline]
ffff88805bda4d28 (&dev->lock){+.+.}-{4:4}, at: netdev_lock_ops include/linux/netdevice.h:2804 [inline]
ffff88805bda4d28 (&dev->lock){+.+.}-{4:4}, at: dev_set_allmulti+0x11c/0x270 net/core/dev_api.c:277
other info that might help us debug this:
context-{5:5}
2 locks held by syz.1.777/8501:
#0: ffffffff8fed6848 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock net/core/rtnetlink.c:79 [inline]
#0: ffffffff8fed6848 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_nets_lock net/core/rtnetlink.c:340 [inline]
#0: ffffffff8fed6848 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0xc4c/0x1d90 net/core/rtnetlink.c:4053
#1: ffffffff8eb392e0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:337 [inline]
#1: ffffffff8eb392e0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:849 [inline]
#1: ffffffff8eb392e0 (rcu_read_lock){....}-{1:3}, at: team_change_rx_flags+0x29/0x330 drivers/net/team/team_core.c:1780
stack backtrace:
CPU: 1 UID: 0 PID: 8501 Comm: syz.1.777 Tainted: G W 6.14.0-rc5-syzkaller-01140-ge2537326e3b6 #0
Tainted: [W]=WARN
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
print_lock_invalid_wait_context kernel/locking/lockdep.c:4828 [inline]
check_wait_context kernel/locking/lockdep.c:4900 [inline]
__lock_acquire+0x15a8/0x2100 kernel/locking/lockdep.c:5178
lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5851
__mutex_lock_common kernel/locking/mutex.c:585 [inline]
__mutex_lock+0x19c/0x1010 kernel/locking/mutex.c:730
netdev_lock include/linux/netdevice.h:2765 [inline]
netdev_lock_ops include/linux/netdevice.h:2804 [inline]
dev_set_allmulti+0x11c/0x270 net/core/dev_api.c:277
team_change_rx_flags+0x1a8/0x330 drivers/net/team/team_core.c:1788
dev_change_rx_flags net/core/dev.c:9153 [inline]
netif_set_allmulti+0x20e/0x380 net/core/dev.c:9255
dev_set_allmulti+0x143/0x270 net/core/dev_api.c:278
nbp_delete_promisc net/bridge/br_if.c:252 [inline]
del_nbp+0xce/0xb40 net/bridge/br_if.c:340
br_del_if+0x145/0x320 net/bridge/br_if.c:739
do_set_master+0x349/0x730 net/core/rtnetlink.c:2926
do_setlink+0xfee/0x40f0 net/core/rtnetlink.c:3148
rtnl_changelink net/core/rtnetlink.c:3758 [inline]
__rtnl_newlink net/core/rtnetlink.c:3917 [inline]
rtnl_newlink+0x15a6/0x1d90 net/core/rtnetlink.c:4054
rtnetlink_rcv_msg+0x791/0xcf0 net/core/rtnetlink.c:6944
netlink_rcv_skb+0x206/0x480 net/netlink/af_netlink.c:2534
netlink_unicast_kernel net/netlink/af_netlink.c:1313 [inline]
netlink_unicast+0x7f6/0x990 net/netlink/af_netlink.c:1339
netlink_sendmsg+0x8de/0xcb0 net/netlink/af_netlink.c:1883
sock_sendmsg_nosec net/socket.c:709 [inline]
__sock_sendmsg+0x221/0x270 net/socket.c:724
____sys_sendmsg+0x53a/0x860 net/socket.c:2564
___sys_sendmsg net/socket.c:2618 [inline]
__sys_sendmsg+0x269/0x350 net/socket.c:2650
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f3fd8b8d169
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f3fd9a8c038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00007f3fd8da6080 RCX: 00007f3fd8b8d169
RDX: 0000000004040850 RSI: 0000400000000000 RDI: 000000000000000e
RBP: 00007f3fd8c0e2a0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007f3fd8da6080 R15: 00007ffd6f16a798
netdevsim netdevsim1 netdevsim0: left allmulticast mode
team0: left promiscuous mode
team_slave_0: left promiscuous mode
team_slave_1: left promiscuous mode
geneve0: left promiscuous mode
netdevsim netdevsim1 netdevsim0: left promiscuous mode
bridge0: port 3(team0) entered disabled state
batman_adv: batadv0: Adding interface: team0
batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
batman_adv: batadv0: Not using interface team0 (retrying later): interface not active