bridge0: left promiscuous mode vlan1: left promiscuous mode BUG: sleeping function called from invalid context at kernel/locking/mutex.c:591 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 11124, name: syz.1.16754 preempt_count: 201, expected: 0 RCU nest depth: 0, expected: 0 2 locks held by syz.1.16754/11124: #0: ffffffff8fbc5e48 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock net/core/rtnetlink.c:80 [inline] #0: ffffffff8fbc5e48 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_nets_lock net/core/rtnetlink.c:341 [inline] #0: ffffffff8fbc5e48 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0x8a1/0x1be0 net/core/rtnetlink.c:4071 #1: ffff888034afc370 (&dev_addr_list_lock_key#7/2){+...}-{3:3}, at: netif_addr_lock_bh include/linux/netdevice.h:4867 [inline] #1: ffff888034afc370 (&dev_addr_list_lock_key#7/2){+...}-{3:3}, at: dev_set_rx_mode+0x65/0x2d0 net/core/dev.c:9689 Preemption disabled at: [] local_bh_disable include/linux/bottom_half.h:20 [inline] [] netif_addr_lock_bh include/linux/netdevice.h:4866 [inline] [] dev_set_rx_mode+0x54/0x2d0 net/core/dev.c:9689 CPU: 1 UID: 0 PID: 11124 Comm: syz.1.16754 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Call Trace: dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120 __might_resched+0x378/0x4d0 kernel/sched/core.c:8884 __mutex_lock_common kernel/locking/mutex.c:591 [inline] __mutex_lock+0x119/0x1300 kernel/locking/mutex.c:776 netdev_lock include/linux/netdevice.h:2784 [inline] netdev_lock_ops include/net/netdev_lock.h:42 [inline] dev_set_promiscuity+0x10e/0x260 net/core/dev_api.c:286 dev_change_rx_flags net/core/dev.c:9546 [inline] __dev_set_promiscuity+0x515/0x710 net/core/dev.c:9590 netif_set_promiscuity+0x50/0xe0 net/core/dev.c:9610 dev_set_promiscuity+0x126/0x260 net/core/dev_api.c:287 br_port_clear_promisc net/bridge/br_if.c:135 [inline] br_manage_promisc+0x4db/0x560 net/bridge/br_if.c:172 dev_change_rx_flags net/core/dev.c:9546 [inline] __dev_set_promiscuity+0x515/0x710 net/core/dev.c:9590 __dev_set_rx_mode net/core/dev.c:-1 [inline] dev_set_rx_mode+0x1c9/0x2d0 net/core/dev.c:9690 __dev_open+0x672/0x830 net/core/dev.c:1710 __dev_change_flags+0x1f7/0x690 net/core/dev.c:9763 netif_change_flags+0x88/0x1a0 net/core/dev.c:9826 do_setlink+0xf82/0x4590 net/core/rtnetlink.c:3158 rtnl_group_changelink net/core/rtnetlink.c:3790 [inline] __rtnl_newlink net/core/rtnetlink.c:3944 [inline] rtnl_newlink+0x147a/0x1be0 net/core/rtnetlink.c:4072 rtnetlink_rcv_msg+0x7d5/0xbe0 net/core/rtnetlink.c:6958 netlink_rcv_skb+0x232/0x4b0 net/netlink/af_netlink.c:2550 netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline] netlink_unicast+0x80f/0x9b0 net/netlink/af_netlink.c:1344 netlink_sendmsg+0x813/0xb40 net/netlink/af_netlink.c:1894 sock_sendmsg_nosec net/socket.c:727 [inline] __sock_sendmsg net/socket.c:742 [inline] ____sys_sendmsg+0xa68/0xad0 net/socket.c:2592 ___sys_sendmsg+0x2a5/0x360 net/socket.c:2646 __sys_sendmsg net/socket.c:2678 [inline] __do_sys_sendmsg net/socket.c:2683 [inline] __se_sys_sendmsg net/socket.c:2681 [inline] __x64_sys_sendmsg+0x1bd/0x2a0 net/socket.c:2681 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x14d/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f795379c799 Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f79546fb028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007f7953a16090 RCX: 00007f795379c799 RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000005 RBP: 00007f7953832bd9 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f7953a16128 R14: 00007f7953a16090 R15: 00007fffdee65228 ============================= [ BUG: Invalid wait context ] syzkaller #0 Tainted: G W ----------------------------- syz.1.16754/11124 is trying to lock: ffff8880354ced40 (&dev_instance_lock_key#3){+.+.}-{4:4}, at: netdev_lock include/linux/netdevice.h:2784 [inline] ffff8880354ced40 (&dev_instance_lock_key#3){+.+.}-{4:4}, at: netdev_lock_ops include/net/netdev_lock.h:42 [inline] ffff8880354ced40 (&dev_instance_lock_key#3){+.+.}-{4:4}, at: dev_set_promiscuity+0x10e/0x260 net/core/dev_api.c:286 other info that might help us debug this: context-{5:5} 2 locks held by syz.1.16754/11124: #0: ffffffff8fbc5e48 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock net/core/rtnetlink.c:80 [inline] #0: ffffffff8fbc5e48 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_nets_lock net/core/rtnetlink.c:341 [inline] #0: ffffffff8fbc5e48 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0x8a1/0x1be0 net/core/rtnetlink.c:4071 #1: ffff888034afc370 (&dev_addr_list_lock_key#7/2){+...}-{3:3}, at: netif_addr_lock_bh include/linux/netdevice.h:4867 [inline] #1: ffff888034afc370 (&dev_addr_list_lock_key#7/2){+...}-{3:3}, at: dev_set_rx_mode+0x65/0x2d0 net/core/dev.c:9689 stack backtrace: CPU: 1 UID: 0 PID: 11124 Comm: syz.1.16754 Tainted: G W syzkaller #0 PREEMPT(full) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Call Trace: dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120 print_lock_invalid_wait_context kernel/locking/lockdep.c:4830 [inline] check_wait_context kernel/locking/lockdep.c:4902 [inline] __lock_acquire+0xec1/0x2cf0 kernel/locking/lockdep.c:5187 lock_acquire+0xf0/0x2e0 kernel/locking/lockdep.c:5868 __mutex_lock_common kernel/locking/mutex.c:614 [inline] __mutex_lock+0x19f/0x1300 kernel/locking/mutex.c:776 netdev_lock include/linux/netdevice.h:2784 [inline] netdev_lock_ops include/net/netdev_lock.h:42 [inline] dev_set_promiscuity+0x10e/0x260 net/core/dev_api.c:286 dev_change_rx_flags net/core/dev.c:9546 [inline] __dev_set_promiscuity+0x515/0x710 net/core/dev.c:9590 netif_set_promiscuity+0x50/0xe0 net/core/dev.c:9610 dev_set_promiscuity+0x126/0x260 net/core/dev_api.c:287 br_port_clear_promisc net/bridge/br_if.c:135 [inline] br_manage_promisc+0x4db/0x560 net/bridge/br_if.c:172 dev_change_rx_flags net/core/dev.c:9546 [inline] __dev_set_promiscuity+0x515/0x710 net/core/dev.c:9590 __dev_set_rx_mode net/core/dev.c:-1 [inline] dev_set_rx_mode+0x1c9/0x2d0 net/core/dev.c:9690 __dev_open+0x672/0x830 net/core/dev.c:1710 __dev_change_flags+0x1f7/0x690 net/core/dev.c:9763 netif_change_flags+0x88/0x1a0 net/core/dev.c:9826 do_setlink+0xf82/0x4590 net/core/rtnetlink.c:3158 rtnl_group_changelink net/core/rtnetlink.c:3790 [inline] __rtnl_newlink net/core/rtnetlink.c:3944 [inline] rtnl_newlink+0x147a/0x1be0 net/core/rtnetlink.c:4072 rtnetlink_rcv_msg+0x7d5/0xbe0 net/core/rtnetlink.c:6958 netlink_rcv_skb+0x232/0x4b0 net/netlink/af_netlink.c:2550 netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline] netlink_unicast+0x80f/0x9b0 net/netlink/af_netlink.c:1344 netlink_sendmsg+0x813/0xb40 net/netlink/af_netlink.c:1894 sock_sendmsg_nosec net/socket.c:727 [inline] __sock_sendmsg net/socket.c:742 [inline] ____sys_sendmsg+0xa68/0xad0 net/socket.c:2592 ___sys_sendmsg+0x2a5/0x360 net/socket.c:2646 __sys_sendmsg net/socket.c:2678 [inline] __do_sys_sendmsg net/socket.c:2683 [inline] __se_sys_sendmsg net/socket.c:2681 [inline] __x64_sys_sendmsg+0x1bd/0x2a0 net/socket.c:2681 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x14d/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f795379c799 Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f79546fb028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007f7953a16090 RCX: 00007f795379c799 RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000005 RBP: 00007f7953832bd9 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f7953a16128 R14: 00007f7953a16090 R15: 00007fffdee65228 dummy0: left promiscuous mode 8021q: adding VLAN 0 to HW filter on device bond0 dummy0: entered promiscuous mode chnl_net:chnl_net_open(): err: Unable to register and open device, Err:-19 caif:caif_disconnect_client(): nothing to disconnect chnl_net:chnl_flowctrl_cb(): NET flowctrl func called flow: CLOSE/DEINIT chnl_net:chnl_net_open(): state disconnected