dummy0: entered promiscuous mode netlink: 4 bytes leftover after parsing attributes in process `syz.0.147'. BUG: sleeping function called from invalid context at kernel/locking/mutex.c:578 in_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 3856, name: syz.0.147 preempt_count: 0, expected: 0 RCU nest depth: 1, expected: 0 2 locks held by syz.0.147/3856: #0: ffff800088807028 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock net/core/rtnetlink.c:80 [inline] #0: ffff800088807028 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_net_lock include/linux/rtnetlink.h:130 [inline] #0: ffff800088807028 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_dellink+0x208/0x7ac net/core/rtnetlink.c:3556 #1: ffff8000872abb60 (rcu_read_lock){....}-{1:3}, at: read_pnet include/net/net_namespace.h:409 [inline] #1: ffff8000872abb60 (rcu_read_lock){....}-{1:3}, at: dev_net include/linux/netdevice.h:2708 [inline] #1: ffff8000872abb60 (rcu_read_lock){....}-{1:3}, at: packet_notifier+0x50/0x664 net/packet/af_packet.c:4238 CPU: 0 UID: 0 PID: 3856 Comm: syz.0.147 Not tainted 6.15.0-syzkaller-02148-g44ed0f35df34 #0 PREEMPT Hardware name: linux,dummy-virt (DT) Call trace: show_stack+0x18/0x24 arch/arm64/kernel/stacktrace.c:466 (C) __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0xdc/0xf4 lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 __might_resched+0x3dc/0x5bc kernel/sched/core.c:8795 __might_sleep+0x94/0x154 kernel/sched/core.c:8724 __mutex_lock_common kernel/locking/mutex.c:578 [inline] __mutex_lock+0xcc/0x9d8 kernel/locking/mutex.c:746 mutex_lock_nested+0x24/0x30 kernel/locking/mutex.c:798 netdev_lock include/linux/netdevice.h:2751 [inline] netdev_lock_ops include/net/netdev_lock.h:42 [inline] netdev_lock_ops include/net/netdev_lock.h:39 [inline] dev_set_promiscuity+0x7c/0x1d0 net/core/dev_api.c:285 packet_dev_mc+0x5c/0x22c net/packet/af_packet.c:3698 packet_dev_mclist_delete net/packet/af_packet.c:3722 [inline] packet_notifier+0x430/0x664 net/packet/af_packet.c:4247 notifier_call_chain+0x11c/0x49c kernel/notifier.c:85 raw_notifier_call_chain+0x18/0x24 kernel/notifier.c:453 call_netdevice_notifiers_info+0x88/0xe8 net/core/dev.c:2176 call_netdevice_notifiers_extack net/core/dev.c:2214 [inline] call_netdevice_notifiers net/core/dev.c:2228 [inline] unregister_netdevice_many_notify+0xac0/0x1be8 net/core/dev.c:11972 rtnl_delete_link net/core/rtnetlink.c:3522 [inline] rtnl_dellink+0x2ec/0x7ac net/core/rtnetlink.c:3564 rtnetlink_rcv_msg+0x65c/0x8d4 net/core/rtnetlink.c:6955 netlink_rcv_skb+0x1a8/0x348 net/netlink/af_netlink.c:2534 rtnetlink_rcv+0x18/0x24 net/core/rtnetlink.c:6982 netlink_unicast_kernel net/netlink/af_netlink.c:1313 [inline] netlink_unicast+0x3c0/0x670 net/netlink/af_netlink.c:1339 netlink_sendmsg+0x644/0xa54 net/netlink/af_netlink.c:1883 sock_sendmsg_nosec net/socket.c:712 [inline] __sock_sendmsg+0xc8/0x168 net/socket.c:727 ____sys_sendmsg+0x504/0x768 net/socket.c:2566 ___sys_sendmsg+0x11c/0x19c net/socket.c:2620 __sys_sendmsg+0x114/0x19c net/socket.c:2652 __do_sys_sendmsg net/socket.c:2657 [inline] __se_sys_sendmsg net/socket.c:2655 [inline] __arm64_sys_sendmsg+0x70/0xa0 net/socket.c:2655 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x6c/0x258 arch/arm64/kernel/syscall.c:49 el0_svc_common.constprop.0+0xac/0x230 arch/arm64/kernel/syscall.c:132 do_el0_svc+0x40/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x50/0x180 arch/arm64/kernel/entry-common.c:744 el0t_64_sync_handler+0x10c/0x138 arch/arm64/kernel/entry-common.c:762 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600 ============================= [ BUG: Invalid wait context ] 6.15.0-syzkaller-02148-g44ed0f35df34 #0 Tainted: G W ----------------------------- syz.0.147/3856 is trying to lock: ffff0000133cad10 (&dev_instance_lock_key#3){+.+.}-{4:4}, at: netdev_lock include/linux/netdevice.h:2751 [inline] ffff0000133cad10 (&dev_instance_lock_key#3){+.+.}-{4:4}, at: netdev_lock_ops include/net/netdev_lock.h:42 [inline] ffff0000133cad10 (&dev_instance_lock_key#3){+.+.}-{4:4}, at: netdev_lock_ops include/net/netdev_lock.h:39 [inline] ffff0000133cad10 (&dev_instance_lock_key#3){+.+.}-{4:4}, at: dev_set_promiscuity+0x7c/0x1d0 net/core/dev_api.c:285 other info that might help us debug this: context-{5:5} 2 locks held by syz.0.147/3856: #0: ffff800088807028 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock net/core/rtnetlink.c:80 [inline] #0: ffff800088807028 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_net_lock include/linux/rtnetlink.h:130 [inline] #0: ffff800088807028 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_dellink+0x208/0x7ac net/core/rtnetlink.c:3556 #1: ffff8000872abb60 (rcu_read_lock){....}-{1:3}, at: read_pnet include/net/net_namespace.h:409 [inline] #1: ffff8000872abb60 (rcu_read_lock){....}-{1:3}, at: dev_net include/linux/netdevice.h:2708 [inline] #1: ffff8000872abb60 (rcu_read_lock){....}-{1:3}, at: packet_notifier+0x50/0x664 net/packet/af_packet.c:4238 stack backtrace: CPU: 0 UID: 0 PID: 3856 Comm: syz.0.147 Tainted: G W 6.15.0-syzkaller-02148-g44ed0f35df34 #0 PREEMPT Tainted: [W]=WARN Hardware name: linux,dummy-virt (DT) Call trace: show_stack+0x18/0x24 arch/arm64/kernel/stacktrace.c:466 (C) __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0xa4/0xf4 lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 print_lock_invalid_wait_context kernel/locking/lockdep.c:4833 [inline] check_wait_context kernel/locking/lockdep.c:4905 [inline] __lock_acquire+0xaf8/0x2380 kernel/locking/lockdep.c:5190 lock_acquire kernel/locking/lockdep.c:5871 [inline] lock_acquire+0x310/0x38c kernel/locking/lockdep.c:5828 __mutex_lock_common kernel/locking/mutex.c:601 [inline] __mutex_lock+0x144/0x9d8 kernel/locking/mutex.c:746 mutex_lock_nested+0x24/0x30 kernel/locking/mutex.c:798 netdev_lock include/linux/netdevice.h:2751 [inline] netdev_lock_ops include/net/netdev_lock.h:42 [inline] netdev_lock_ops include/net/netdev_lock.h:39 [inline] dev_set_promiscuity+0x7c/0x1d0 net/core/dev_api.c:285 packet_dev_mc+0x5c/0x22c net/packet/af_packet.c:3698 packet_dev_mclist_delete net/packet/af_packet.c:3722 [inline] packet_notifier+0x430/0x664 net/packet/af_packet.c:4247 notifier_call_chain+0x11c/0x49c kernel/notifier.c:85 raw_notifier_call_chain+0x18/0x24 kernel/notifier.c:453 call_netdevice_notifiers_info+0x88/0xe8 net/core/dev.c:2176 call_netdevice_notifiers_extack net/core/dev.c:2214 [inline] call_netdevice_notifiers net/core/dev.c:2228 [inline] unregister_netdevice_many_notify+0xac0/0x1be8 net/core/dev.c:11972 rtnl_delete_link net/core/rtnetlink.c:3522 [inline] rtnl_dellink+0x2ec/0x7ac net/core/rtnetlink.c:3564 rtnetlink_rcv_msg+0x65c/0x8d4 net/core/rtnetlink.c:6955 netlink_rcv_skb+0x1a8/0x348 net/netlink/af_netlink.c:2534 rtnetlink_rcv+0x18/0x24 net/core/rtnetlink.c:6982 netlink_unicast_kernel net/netlink/af_netlink.c:1313 [inline] netlink_unicast+0x3c0/0x670 net/netlink/af_netlink.c:1339 netlink_sendmsg+0x644/0xa54 net/netlink/af_netlink.c:1883 sock_sendmsg_nosec net/socket.c:712 [inline] __sock_sendmsg+0xc8/0x168 net/socket.c:727 ____sys_sendmsg+0x504/0x768 net/socket.c:2566 ___sys_sendmsg+0x11c/0x19c net/socket.c:2620 __sys_sendmsg+0x114/0x19c net/socket.c:2652 __do_sys_sendmsg net/socket.c:2657 [inline] __se_sys_sendmsg net/socket.c:2655 [inline] __arm64_sys_sendmsg+0x70/0xa0 net/socket.c:2655 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x6c/0x258 arch/arm64/kernel/syscall.c:49 el0_svc_common.constprop.0+0xac/0x230 arch/arm64/kernel/syscall.c:132 do_el0_svc+0x40/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x50/0x180 arch/arm64/kernel/entry-common.c:744 el0t_64_sync_handler+0x10c/0x138 arch/arm64/kernel/entry-common.c:762 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600 dummy0 (unregistering): left promiscuous mode