device macsec0 left promiscuous mode ===================================================== WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected 5.9.0-rc1-syzkaller #0 Not tainted ----------------------------------------------------- syz-executor.1/8648 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire: ffff88805d4860f0 (&net->nsid_lock){+.+.}-{2:2}, at: spin_lock include/linux/spinlock.h:354 [inline] ffff88805d4860f0 (&net->nsid_lock){+.+.}-{2:2}, at: peernet2id_alloc+0xd0/0x430 net/core/net_namespace.c:254 and this task is already holding: ffff888059010280 (&macsec_netdev_addr_lock_key){+...}-{2:2}, at: spin_lock_bh include/linux/spinlock.h:359 [inline] ffff888059010280 (&macsec_netdev_addr_lock_key){+...}-{2:2}, at: netif_addr_lock_bh include/linux/netdevice.h:4291 [inline] ffff888059010280 (&macsec_netdev_addr_lock_key){+...}-{2:2}, at: dev_set_rx_mode net/core/dev.c:8210 [inline] ffff888059010280 (&macsec_netdev_addr_lock_key){+...}-{2:2}, at: __dev_change_flags+0x18d/0x660 net/core/dev.c:8271 which would create a new lock dependency: (&macsec_netdev_addr_lock_key){+...}-{2:2} -> (&net->nsid_lock){+.+.}-{2:2} but this new dependency connects a SOFTIRQ-irq-safe lock: (&mc->mca_lock){+.-.}-{2:2} ... which became SOFTIRQ-irq-safe at: lock_acquire+0x1f1/0xad0 kernel/locking/lockdep.c:5005 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:135 [inline] _raw_spin_lock_bh+0x2f/0x40 kernel/locking/spinlock.c:175 spin_lock_bh include/linux/spinlock.h:359 [inline] mld_send_cr net/ipv6/mcast.c:1950 [inline] mld_ifc_timer_expire+0x497/0xf10 net/ipv6/mcast.c:2474 call_timer_fn+0x1ac/0x760 kernel/time/timer.c:1413 expire_timers kernel/time/timer.c:1458 [inline] __run_timers.part.0+0x67c/0xaa0 kernel/time/timer.c:1755 __run_timers kernel/time/timer.c:1736 [inline] run_timer_softirq+0xae/0x1a0 kernel/time/timer.c:1768 __do_softirq+0x2de/0xa24 kernel/softirq.c:298 asm_call_on_stack+0xf/0x20 arch/x86/entry/entry_64.S:706 __run_on_irqstack arch/x86/include/asm/irq_stack.h:22 [inline] run_on_irqstack_cond arch/x86/include/asm/irq_stack.h:48 [inline] do_softirq_own_stack+0x9d/0xd0 arch/x86/kernel/irq_64.c:77 invoke_softirq kernel/softirq.c:393 [inline] __irq_exit_rcu kernel/softirq.c:423 [inline] irq_exit_rcu+0x1f3/0x230 kernel/softirq.c:435 sysvec_apic_timer_interrupt+0x51/0xf0 arch/x86/kernel/apic/apic.c:1091 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:581 get_current arch/x86/include/asm/current.h:15 [inline] __sanitizer_cov_trace_pc+0x9/0x60 kernel/kcov.c:196 tomoyo_domain_quota_is_ok+0x31a/0x550 security/tomoyo/util.c:1070 tomoyo_supervisor+0x2d4/0xeb0 security/tomoyo/common.c:2089 tomoyo_audit_path_log security/tomoyo/file.c:168 [inline] tomoyo_path_permission security/tomoyo/file.c:587 [inline] tomoyo_path_permission+0x25c/0x360 security/tomoyo/file.c:573 tomoyo_path_perm+0x2e7/0x3f0 security/tomoyo/file.c:838 security_inode_getattr+0xcf/0x140 security/security.c:1278 vfs_getattr fs/stat.c:121 [inline] vfs_statx+0x170/0x390 fs/stat.c:206 vfs_lstat include/linux/fs.h:3175 [inline] __do_sys_newlstat+0x91/0x110 fs/stat.c:374 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 to a SOFTIRQ-irq-unsafe lock: (&net->nsid_lock){+.+.}-{2:2} ... which became SOFTIRQ-irq-unsafe at: ... lock_acquire+0x1f1/0xad0 kernel/locking/lockdep.c:5005 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:151 spin_lock include/linux/spinlock.h:354 [inline] unhash_nsid net/core/net_namespace.c:537 [inline] cleanup_net+0x2ab/0xa00 net/core/net_namespace.c:585 process_one_work+0x94c/0x1670 kernel/workqueue.c:2269 worker_thread+0x64c/0x1120 kernel/workqueue.c:2415 kthread+0x3b5/0x4a0 kernel/kthread.c:292 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:294 other info that might help us debug this: Chain exists of: &mc->mca_lock --> &macsec_netdev_addr_lock_key --> &net->nsid_lock Possible interrupt unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&net->nsid_lock); local_irq_disable(); lock(&mc->mca_lock); lock(&macsec_netdev_addr_lock_key); lock(&mc->mca_lock); *** DEADLOCK *** 2 locks held by syz-executor.1/8648: #0: ffffffff8a7ea188 (rtnl_mutex){+.+.}-{3:3}, at: devinet_ioctl+0x1b3/0x1ca0 net/ipv4/devinet.c:1067 #1: ffff888059010280 (&macsec_netdev_addr_lock_key){+...}-{2:2}, at: spin_lock_bh include/linux/spinlock.h:359 [inline] #1: ffff888059010280 (&macsec_netdev_addr_lock_key){+...}-{2:2}, at: netif_addr_lock_bh include/linux/netdevice.h:4291 [inline] #1: ffff888059010280 (&macsec_netdev_addr_lock_key){+...}-{2:2}, at: dev_set_rx_mode net/core/dev.c:8210 [inline] #1: ffff888059010280 (&macsec_netdev_addr_lock_key){+...}-{2:2}, at: __dev_change_flags+0x18d/0x660 net/core/dev.c:8271 the dependencies between SOFTIRQ-irq-safe lock and the holding lock: -> (&mc->mca_lock){+.-.}-{2:2} { HARDIRQ-ON-W at: lock_acquire+0x1f1/0xad0 kernel/locking/lockdep.c:5005 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:135 [inline] _raw_spin_lock_bh+0x2f/0x40 kernel/locking/spinlock.c:175 spin_lock_bh include/linux/spinlock.h:359 [inline] mld_del_delrec+0x493/0x720 net/ipv6/mcast.c:783 __ipv6_dev_mc_inc+0x809/0xca0 net/ipv6/mcast.c:927 ipv6_add_dev+0x969/0x1060 net/ipv6/addrconf.c:453 addrconf_init+0xd3/0x39a net/ipv6/addrconf.c:7129 inet6_init+0x368/0x705 net/ipv6/af_inet6.c:1138 do_one_initcall+0x10a/0x7a4 init/main.c:1204 do_initcall_level init/main.c:1277 [inline] do_initcalls init/main.c:1293 [inline] do_basic_setup init/main.c:1313 [inline] kernel_init_freeable+0x59c/0x620 init/main.c:1512 kernel_init+0xd/0x1c0 init/main.c:1402 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:294 IN-SOFTIRQ-W at: lock_acquire+0x1f1/0xad0 kernel/locking/lockdep.c:5005 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:135 [inline] _raw_spin_lock_bh+0x2f/0x40 kernel/locking/spinlock.c:175 spin_lock_bh include/linux/spinlock.h:359 [inline] mld_send_cr net/ipv6/mcast.c:1950 [inline] mld_ifc_timer_expire+0x497/0xf10 net/ipv6/mcast.c:2474 call_timer_fn+0x1ac/0x760 kernel/time/timer.c:1413 expire_timers kernel/time/timer.c:1458 [inline] __run_timers.part.0+0x67c/0xaa0 kernel/time/timer.c:1755 __run_timers kernel/time/timer.c:1736 [inline] run_timer_softirq+0xae/0x1a0 kernel/time/timer.c:1768 __do_softirq+0x2de/0xa24 kernel/softirq.c:298 asm_call_on_stack+0xf/0x20 arch/x86/entry/entry_64.S:706 __run_on_irqstack arch/x86/include/asm/irq_stack.h:22 [inline] run_on_irqstack_cond arch/x86/include/asm/irq_stack.h:48 [inline] do_softirq_own_stack+0x9d/0xd0 arch/x86/kernel/irq_64.c:77 invoke_softirq kernel/softirq.c:393 [inline] __irq_exit_rcu kernel/softirq.c:423 [inline] irq_exit_rcu+0x1f3/0x230 kernel/softirq.c:435 sysvec_apic_timer_interrupt+0x51/0xf0 arch/x86/kernel/apic/apic.c:1091 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:581 get_current arch/x86/include/asm/current.h:15 [inline] __sanitizer_cov_trace_pc+0x9/0x60 kernel/kcov.c:196 tomoyo_domain_quota_is_ok+0x31a/0x550 security/tomoyo/util.c:1070 tomoyo_supervisor+0x2d4/0xeb0 security/tomoyo/common.c:2089 tomoyo_audit_path_log security/tomoyo/file.c:168 [inline] tomoyo_path_permission security/tomoyo/file.c:587 [inline] tomoyo_path_permission+0x25c/0x360 security/tomoyo/file.c:573 tomoyo_path_perm+0x2e7/0x3f0 security/tomoyo/file.c:838 security_inode_getattr+0xcf/0x140 security/security.c:1278 vfs_getattr fs/stat.c:121 [inline] vfs_statx+0x170/0x390 fs/stat.c:206 vfs_lstat include/linux/fs.h:3175 [inline] __do_sys_newlstat+0x91/0x110 fs/stat.c:374 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 INITIAL USE at: lock_acquire+0x1f1/0xad0 kernel/locking/lockdep.c:5005 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:135 [inline] _raw_spin_lock_bh+0x2f/0x40 kernel/locking/spinlock.c:175 spin_lock_bh include/linux/spinlock.h:359 [inline] mld_del_delrec+0x493/0x720 net/ipv6/mcast.c:783 __ipv6_dev_mc_inc+0x809/0xca0 net/ipv6/mcast.c:927 ipv6_add_dev+0x969/0x1060 net/ipv6/addrconf.c:453 addrconf_init+0xd3/0x39a net/ipv6/addrconf.c:7129 inet6_init+0x368/0x705 net/ipv6/af_inet6.c:1138 do_one_initcall+0x10a/0x7a4 init/main.c:1204 do_initcall_level init/main.c:1277 [inline] do_initcalls init/main.c:1293 [inline] do_basic_setup init/main.c:1313 [inline] kernel_init_freeable+0x59c/0x620 init/main.c:1512 kernel_init+0xd/0x1c0 init/main.c:1402 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:294 } ... key at: [] __key.7+0x0/0x40 ... acquired at: __raw_spin_lock_bh include/linux/spinlock_api_smp.h:135 [inline] _raw_spin_lock_bh+0x2f/0x40 kernel/locking/spinlock.c:175 spin_lock_bh include/linux/spinlock.h:359 [inline] netif_addr_lock_bh include/linux/netdevice.h:4291 [inline] __dev_mc_add net/core/dev_addr_lists.c:774 [inline] dev_mc_add+0x1f/0xb0 net/core/dev_addr_lists.c:792 igmp6_group_added+0x4bc/0x5d0 net/ipv6/mcast.c:669 __ipv6_dev_mc_inc+0x811/0xca0 net/ipv6/mcast.c:928 addrconf_join_solict net/ipv6/addrconf.c:2167 [inline] addrconf_join_solict net/ipv6/addrconf.c:2159 [inline] addrconf_dad_begin net/ipv6/addrconf.c:3933 [inline] addrconf_dad_work+0xc92/0x1280 net/ipv6/addrconf.c:4060 process_one_work+0x94c/0x1670 kernel/workqueue.c:2269 worker_thread+0x64c/0x1120 kernel/workqueue.c:2415 kthread+0x3b5/0x4a0 kernel/kthread.c:292 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:294 -> (&macsec_netdev_addr_lock_key){+...}-{2:2} { HARDIRQ-ON-W at: lock_acquire+0x1f1/0xad0 kernel/locking/lockdep.c:5005 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:135 [inline] _raw_spin_lock_bh+0x2f/0x40 kernel/locking/spinlock.c:175 spin_lock_bh include/linux/spinlock.h:359 [inline] netif_addr_lock_bh include/linux/netdevice.h:4291 [inline] __dev_mc_add net/core/dev_addr_lists.c:774 [inline] dev_mc_add+0x1f/0xb0 net/core/dev_addr_lists.c:792 igmp6_group_added+0x4bc/0x5d0 net/ipv6/mcast.c:669 __ipv6_dev_mc_inc+0x811/0xca0 net/ipv6/mcast.c:928 addrconf_join_solict net/ipv6/addrconf.c:2167 [inline] addrconf_join_solict net/ipv6/addrconf.c:2159 [inline] addrconf_dad_begin net/ipv6/addrconf.c:3933 [inline] addrconf_dad_work+0xc92/0x1280 net/ipv6/addrconf.c:4060 process_one_work+0x94c/0x1670 kernel/workqueue.c:2269 worker_thread+0x64c/0x1120 kernel/workqueue.c:2415 kthread+0x3b5/0x4a0 kernel/kthread.c:292 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:294 INITIAL USE at: lock_acquire+0x1f1/0xad0 kernel/locking/lockdep.c:5005 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:135 [inline] _raw_spin_lock_bh+0x2f/0x40 kernel/locking/spinlock.c:175 spin_lock_bh include/linux/spinlock.h:359 [inline] netif_addr_lock_bh include/linux/netdevice.h:4291 [inline] __dev_mc_add net/core/dev_addr_lists.c:774 [inline] dev_mc_add+0x1f/0xb0 net/core/dev_addr_lists.c:792 igmp6_group_added+0x4bc/0x5d0 net/ipv6/mcast.c:669 __ipv6_dev_mc_inc+0x811/0xca0 net/ipv6/mcast.c:928 addrconf_join_solict net/ipv6/addrconf.c:2167 [inline] addrconf_join_solict net/ipv6/addrconf.c:2159 [inline] addrconf_dad_begin net/ipv6/addrconf.c:3933 [inline] addrconf_dad_work+0xc92/0x1280 net/ipv6/addrconf.c:4060 process_one_work+0x94c/0x1670 kernel/workqueue.c:2269 worker_thread+0x64c/0x1120 kernel/workqueue.c:2415 kthread+0x3b5/0x4a0 kernel/kthread.c:292 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:294 } ... key at: [] macsec_netdev_addr_lock_key+0x0/0x40 ... acquired at: lock_acquire+0x1f1/0xad0 kernel/locking/lockdep.c:5005 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:151 spin_lock include/linux/spinlock.h:354 [inline] peernet2id_alloc+0xd0/0x430 net/core/net_namespace.c:254 rtnl_fill_link_netnsid net/core/rtnetlink.c:1581 [inline] rtnl_fill_ifinfo+0x1d14/0x3dc0 net/core/rtnetlink.c:1798 rtmsg_ifinfo_build_skb+0xcd/0x1a0 net/core/rtnetlink.c:3808 rtmsg_ifinfo_event net/core/rtnetlink.c:3840 [inline] rtmsg_ifinfo_event net/core/rtnetlink.c:3831 [inline] rtmsg_ifinfo+0x83/0x120 net/core/rtnetlink.c:3849 __dev_notify_flags+0x226/0x2b0 net/core/dev.c:8318 __dev_set_promiscuity+0x197/0x210 net/core/dev.c:8094 dev_set_promiscuity+0x4f/0x100 net/core/dev.c:8114 macsec_dev_change_rx_flags+0x13b/0x170 drivers/net/macsec.c:3582 dev_change_rx_flags net/core/dev.c:8047 [inline] __dev_set_promiscuity.cold+0x2f1/0x35f net/core/dev.c:8091 __dev_set_rx_mode+0x266/0x300 net/core/dev.c:8199 dev_set_rx_mode net/core/dev.c:8211 [inline] __dev_change_flags+0x195/0x660 net/core/dev.c:8271 dev_change_flags+0x8a/0x160 net/core/dev.c:8355 devinet_ioctl+0x14fd/0x1ca0 net/ipv4/devinet.c:1143 inet_ioctl+0x1ea/0x330 net/ipv4/af_inet.c:967 packet_ioctl+0xad/0x260 net/packet/af_packet.c:4139 sock_do_ioctl+0xcb/0x2d0 net/socket.c:1047 sock_ioctl+0x3b8/0x730 net/socket.c:1198 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __x64_sys_ioctl+0x193/0x200 fs/ioctl.c:739 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 the dependencies between the lock to be acquired and SOFTIRQ-irq-unsafe lock: -> (&net->nsid_lock){+.+.}-{2:2} { HARDIRQ-ON-W at: lock_acquire+0x1f1/0xad0 kernel/locking/lockdep.c:5005 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:151 spin_lock include/linux/spinlock.h:354 [inline] unhash_nsid net/core/net_namespace.c:537 [inline] cleanup_net+0x2ab/0xa00 net/core/net_namespace.c:585 process_one_work+0x94c/0x1670 kernel/workqueue.c:2269 worker_thread+0x64c/0x1120 kernel/workqueue.c:2415 kthread+0x3b5/0x4a0 kernel/kthread.c:292 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:294 SOFTIRQ-ON-W at: lock_acquire+0x1f1/0xad0 kernel/locking/lockdep.c:5005 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:151 spin_lock include/linux/spinlock.h:354 [inline] unhash_nsid net/core/net_namespace.c:537 [inline] cleanup_net+0x2ab/0xa00 net/core/net_namespace.c:585 process_one_work+0x94c/0x1670 kernel/workqueue.c:2269 worker_thread+0x64c/0x1120 kernel/workqueue.c:2415 kthread+0x3b5/0x4a0 kernel/kthread.c:292 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:294 INITIAL USE at: lock_acquire+0x1f1/0xad0 kernel/locking/lockdep.c:5005 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:151 spin_lock include/linux/spinlock.h:354 [inline] unhash_nsid net/core/net_namespace.c:537 [inline] cleanup_net+0x2ab/0xa00 net/core/net_namespace.c:585 process_one_work+0x94c/0x1670 kernel/workqueue.c:2269 worker_thread+0x64c/0x1120 kernel/workqueue.c:2415 kthread+0x3b5/0x4a0 kernel/kthread.c:292 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:294 } ... key at: [] __key.15+0x0/0x40 ... acquired at: lock_acquire+0x1f1/0xad0 kernel/locking/lockdep.c:5005 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:151 spin_lock include/linux/spinlock.h:354 [inline] peernet2id_alloc+0xd0/0x430 net/core/net_namespace.c:254 rtnl_fill_link_netnsid net/core/rtnetlink.c:1581 [inline] rtnl_fill_ifinfo+0x1d14/0x3dc0 net/core/rtnetlink.c:1798 rtmsg_ifinfo_build_skb+0xcd/0x1a0 net/core/rtnetlink.c:3808 rtmsg_ifinfo_event net/core/rtnetlink.c:3840 [inline] rtmsg_ifinfo_event net/core/rtnetlink.c:3831 [inline] rtmsg_ifinfo+0x83/0x120 net/core/rtnetlink.c:3849 __dev_notify_flags+0x226/0x2b0 net/core/dev.c:8318 __dev_set_promiscuity+0x197/0x210 net/core/dev.c:8094 dev_set_promiscuity+0x4f/0x100 net/core/dev.c:8114 macsec_dev_change_rx_flags+0x13b/0x170 drivers/net/macsec.c:3582 dev_change_rx_flags net/core/dev.c:8047 [inline] __dev_set_promiscuity.cold+0x2f1/0x35f net/core/dev.c:8091 __dev_set_rx_mode+0x266/0x300 net/core/dev.c:8199 dev_set_rx_mode net/core/dev.c:8211 [inline] __dev_change_flags+0x195/0x660 net/core/dev.c:8271 dev_change_flags+0x8a/0x160 net/core/dev.c:8355 devinet_ioctl+0x14fd/0x1ca0 net/ipv4/devinet.c:1143 inet_ioctl+0x1ea/0x330 net/ipv4/af_inet.c:967 packet_ioctl+0xad/0x260 net/packet/af_packet.c:4139 sock_do_ioctl+0xcb/0x2d0 net/socket.c:1047 sock_ioctl+0x3b8/0x730 net/socket.c:1198 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __x64_sys_ioctl+0x193/0x200 fs/ioctl.c:739 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 stack backtrace: CPU: 0 PID: 8648 Comm: syz-executor.1 Not tainted 5.9.0-rc1-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x18f/0x20d lib/dump_stack.c:118 print_bad_irq_dependency kernel/locking/lockdep.c:2113 [inline] check_irq_usage.cold+0x4a5/0x5a1 kernel/locking/lockdep.c:2311 check_prev_add kernel/locking/lockdep.c:2500 [inline] check_prevs_add kernel/locking/lockdep.c:2601 [inline] validate_chain kernel/locking/lockdep.c:3218 [inline] __lock_acquire+0x2a81/0x5640 kernel/locking/lockdep.c:4426 lock_acquire+0x1f1/0xad0 kernel/locking/lockdep.c:5005 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:151 spin_lock include/linux/spinlock.h:354 [inline] peernet2id_alloc+0xd0/0x430 net/core/net_namespace.c:254 rtnl_fill_link_netnsid net/core/rtnetlink.c:1581 [inline] rtnl_fill_ifinfo+0x1d14/0x3dc0 net/core/rtnetlink.c:1798 rtmsg_ifinfo_build_skb+0xcd/0x1a0 net/core/rtnetlink.c:3808 rtmsg_ifinfo_event net/core/rtnetlink.c:3840 [inline] rtmsg_ifinfo_event net/core/rtnetlink.c:3831 [inline] rtmsg_ifinfo+0x83/0x120 net/core/rtnetlink.c:3849 __dev_notify_flags+0x226/0x2b0 net/core/dev.c:8318 __dev_set_promiscuity+0x197/0x210 net/core/dev.c:8094 dev_set_promiscuity+0x4f/0x100 net/core/dev.c:8114 macsec_dev_change_rx_flags+0x13b/0x170 drivers/net/macsec.c:3582 dev_change_rx_flags net/core/dev.c:8047 [inline] __dev_set_promiscuity.cold+0x2f1/0x35f net/core/dev.c:8091 __dev_set_rx_mode+0x266/0x300 net/core/dev.c:8199 dev_set_rx_mode net/core/dev.c:8211 [inline] __dev_change_flags+0x195/0x660 net/core/dev.c:8271 dev_change_flags+0x8a/0x160 net/core/dev.c:8355 devinet_ioctl+0x14fd/0x1ca0 net/ipv4/devinet.c:1143 inet_ioctl+0x1ea/0x330 net/ipv4/af_inet.c:967 packet_ioctl+0xad/0x260 net/packet/af_packet.c:4139 sock_do_ioctl+0xcb/0x2d0 net/socket.c:1047 sock_ioctl+0x3b8/0x730 net/socket.c:1198 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __x64_sys_ioctl+0x193/0x200 fs/ioctl.c:739 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x45d5b9 Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f45a56f9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000000015340 RCX: 000000000045d5b9 RDX: 0000000020000700 RSI: 0000000000008914 RDI: 0000000000000003 RBP: 000000000118cf80 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118cf4c R13: 00007ffefbd55b4f R14: 00007f45a56fa9c0 R15: 000000000118cf4c device veth1_macvtap left promiscuous mode device veth1_macvtap left promiscuous mode device macsec0 left promiscuous mode