Warning: Permanently added '10.128.0.234' (ED25519) to the list of known hosts. executing program [ 44.502857][ T4018] [ 44.503501][ T4018] ====================================================== [ 44.505124][ T4018] WARNING: possible circular locking dependency detected [ 44.507017][ T4018] 5.15.176-syzkaller #0 Not tainted [ 44.508379][ T4018] ------------------------------------------------------ [ 44.510235][ T4018] syz-executor941/4018 is trying to acquire lock: [ 44.511958][ T4018] ffff0000cb8b0120 (sk_lock-AF_INET6){+.+.}-{0:0}, at: inet_sk_diag_fill+0xcb8/0x17b4 [ 44.514491][ T4018] [ 44.514491][ T4018] but task is already holding lock: [ 44.516335][ T4018] ffff0000c5646368 (&h->lhash2[i].lock){+.+.}-{2:2}, at: mptcp_diag_dump+0x7b0/0x10dc [ 44.518920][ T4018] [ 44.518920][ T4018] which lock already depends on the new lock. [ 44.518920][ T4018] [ 44.521532][ T4018] [ 44.521532][ T4018] the existing dependency chain (in reverse order) is: [ 44.523889][ T4018] [ 44.523889][ T4018] -> #1 (&h->lhash2[i].lock){+.+.}-{2:2}: [ 44.525984][ T4018] _raw_spin_lock+0xb0/0x10c [ 44.527316][ T4018] __inet_hash+0xd0/0x8e0 [ 44.528576][ T4018] inet6_hash+0x74/0x9c [ 44.529737][ T4018] inet_csk_listen_start+0x1e8/0x2cc [ 44.531187][ T4018] inet_listen+0x258/0x6d4 [ 44.532389][ T4018] __sys_listen+0x1ac/0x21c [ 44.533649][ T4018] __arm64_sys_listen+0x5c/0x74 [ 44.535067][ T4018] invoke_syscall+0x98/0x2b8 [ 44.536341][ T4018] el0_svc_common+0x138/0x258 [ 44.537602][ T4018] do_el0_svc+0x58/0x14c [ 44.538746][ T4018] el0_svc+0x7c/0x1f0 [ 44.539880][ T4018] el0t_64_sync_handler+0x84/0xe4 [ 44.541339][ T4018] el0t_64_sync+0x1a0/0x1a4 [ 44.542634][ T4018] [ 44.542634][ T4018] -> #0 (sk_lock-AF_INET6){+.+.}-{0:0}: [ 44.544752][ T4018] __lock_acquire+0x32d4/0x7638 [ 44.546091][ T4018] lock_acquire+0x240/0x77c [ 44.547436][ T4018] mptcp_diag_get_info+0x208/0x8a0 [ 44.548831][ T4018] inet_sk_diag_fill+0xcb8/0x17b4 [ 44.550190][ T4018] mptcp_diag_dump+0xb4c/0x10dc [ 44.551529][ T4018] __inet_diag_dump+0x1e8/0x33c [ 44.552922][ T4018] inet_diag_dump_compat+0x17c/0x288 [ 44.554389][ T4018] netlink_dump+0x4a8/0xad0 [ 44.555698][ T4018] __netlink_dump_start+0x474/0x6d4 [ 44.557161][ T4018] inet_diag_rcv_msg_compat+0x1c8/0x434 [ 44.558733][ T4018] sock_diag_rcv_msg+0x174/0x39c [ 44.560095][ T4018] netlink_rcv_skb+0x20c/0x3b8 [ 44.561420][ T4018] sock_diag_rcv+0x3c/0x54 [ 44.562651][ T4018] netlink_unicast+0x664/0x938 [ 44.563991][ T4018] netlink_sendmsg+0x844/0xb38 [ 44.565356][ T4018] ____sys_sendmsg+0x584/0x870 [ 44.566658][ T4018] ___sys_sendmsg+0x214/0x294 [ 44.568035][ T4018] __arm64_sys_sendmsg+0x1ac/0x25c [ 44.569503][ T4018] invoke_syscall+0x98/0x2b8 [ 44.570870][ T4018] el0_svc_common+0x138/0x258 [ 44.572226][ T4018] do_el0_svc+0x58/0x14c [ 44.573426][ T4018] el0_svc+0x7c/0x1f0 [ 44.574548][ T4018] el0t_64_sync_handler+0x84/0xe4 [ 44.575985][ T4018] el0t_64_sync+0x1a0/0x1a4 [ 44.577297][ T4018] [ 44.577297][ T4018] other info that might help us debug this: [ 44.577297][ T4018] [ 44.579854][ T4018] Possible unsafe locking scenario: [ 44.579854][ T4018] [ 44.581940][ T4018] CPU0 CPU1 [ 44.583317][ T4018] ---- ---- [ 44.584759][ T4018] lock(&h->lhash2[i].lock); [ 44.586026][ T4018] lock(sk_lock-AF_INET6); [ 44.587925][ T4018] lock(&h->lhash2[i].lock); [ 44.589754][ T4018] lock(sk_lock-AF_INET6); [ 44.590916][ T4018] [ 44.590916][ T4018] *** DEADLOCK *** [ 44.590916][ T4018] [ 44.592984][ T4018] 6 locks held by syz-executor941/4018: [ 44.594448][ T4018] #0: ffff800016caddc8 (sock_diag_mutex){+.+.}-{3:3}, at: sock_diag_rcv+0x2c/0x54 [ 44.596846][ T4018] #1: ffff800016cadc28 (sock_diag_table_mutex){+.+.}-{3:3}, at: sock_diag_rcv_msg+0x15c/0x39c [ 44.599739][ T4018] #2: ffff0000c7843690 (nlk_cb_mutex-SOCK_DIAG){+.+.}-{3:3}, at: __netlink_dump_start+0x108/0x6d4 [ 44.602479][ T4018] #3: ffff800016d87228 (inet_diag_table_mutex){+.+.}-{3:3}, at: __inet_diag_dump+0x17c/0x33c [ 44.605246][ T4018] #4: ffff800014d32360 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x10/0x4c [ 44.607712][ T4018] #5: ffff0000c5646368 (&h->lhash2[i].lock){+.+.}-{2:2}, at: mptcp_diag_dump+0x7b0/0x10dc [ 44.610238][ T4018] [ 44.610238][ T4018] stack backtrace: [ 44.611726][ T4018] CPU: 1 PID: 4018 Comm: syz-executor941 Not tainted 5.15.176-syzkaller #0 [ 44.613900][ T4018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 44.616421][ T4018] Call trace: [ 44.617223][ T4018] dump_backtrace+0x0/0x530 [ 44.618304][ T4018] show_stack+0x2c/0x3c [ 44.619304][ T4018] dump_stack_lvl+0x108/0x170 [ 44.620528][ T4018] dump_stack+0x1c/0x58 [ 44.621564][ T4018] print_circular_bug+0x150/0x1b8 [ 44.622832][ T4018] check_noncircular+0x2cc/0x378 [ 44.624096][ T4018] __lock_acquire+0x32d4/0x7638 [ 44.625321][ T4018] lock_acquire+0x240/0x77c [ 44.626446][ T4018] mptcp_diag_get_info+0x208/0x8a0 [ 44.627750][ T4018] inet_sk_diag_fill+0xcb8/0x17b4 [ 44.628986][ T4018] mptcp_diag_dump+0xb4c/0x10dc [ 44.630210][ T4018] __inet_diag_dump+0x1e8/0x33c [ 44.631342][ T4018] inet_diag_dump_compat+0x17c/0x288 [ 44.632732][ T4018] netlink_dump+0x4a8/0xad0 [ 44.633926][ T4018] __netlink_dump_start+0x474/0x6d4 [ 44.635168][ T4018] inet_diag_rcv_msg_compat+0x1c8/0x434 [ 44.636643][ T4018] sock_diag_rcv_msg+0x174/0x39c [ 44.637884][ T4018] netlink_rcv_skb+0x20c/0x3b8 [ 44.639036][ T4018] sock_diag_rcv+0x3c/0x54 [ 44.640167][ T4018] netlink_unicast+0x664/0x938 [ 44.641350][ T4018] netlink_sendmsg+0x844/0xb38 [ 44.642529][ T4018] ____sys_sendmsg+0x584/0x870 [ 44.643788][ T4018] ___sys_sendmsg+0x214/0x294 [ 44.644967][ T4018] __arm64_sys_sendmsg+0x1ac/0x25c [ 44.646229][ T4018] invoke_syscall+0x98/0x2b8 [ 44.647438][ T4018] el0_svc_common+0x138/0x258 [ 44.648543][ T4018] do_el0_svc+0x58/0x14c [ 44.649653][ T4018] el0_svc+0x7c/0x1f0 [ 44.650652][ T4018] el0t_64_sync_handler+0x84/0xe4 [ 44.651967][ T4018] el0t_64_sync+0x1a0/0x1a4 [ 44.653252][ T4018] BUG: sleeping function called from invalid context at net/core/sock.c:3285 [ 44.655466][ T4018] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4018, name: syz-executor941 [ 44.658046][ T4018] INFO: lockdep is turned off. [ 44.659268][ T4018] Preemption disabled at: [ 44.659278][ T4018] [] mptcp_diag_dump+0x7b0/0x10dc [ 44.661932][ T4018] CPU: 1 PID: 4018 Comm: syz-executor941 Not tainted 5.15.176-syzkaller #0 [ 44.664150][ T4018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 44.666691][ T4018] Call trace: [ 44.667509][ T4018] dump_backtrace+0x0/0x530 [ 44.668625][ T4018] show_stack+0x2c/0x3c [ 44.669657][ T4018] dump_stack_lvl+0x108/0x170 [ 44.670834][ T4018] dump_stack+0x1c/0x58 [ 44.671884][ T4018] ___might_sleep+0x380/0x4dc [ 44.673080][ T4018] __might_sleep+0x98/0xf0 [ 44.674197][ T4018] __lock_sock_fast+0x3c/0xf0 [ 44.675395][ T4018] mptcp_diag_get_info+0x210/0x8a0 [ 44.676702][ T4018] inet_sk_diag_fill+0xcb8/0x17b4 [ 44.677959][ T4018] mptcp_diag_dump+0xb4c/0x10dc [ 44.679175][ T4018] __inet_diag_dump+0x1e8/0x33c [ 44.680469][ T4018] inet_diag_dump_compat+0x17c/0x288 [ 44.681809][ T4018] netlink_dump+0x4a8/0xad0 [ 44.682981][ T4018] __netlink_dump_start+0x474/0x6d4 [ 44.684267][ T4018] inet_diag_rcv_msg_compat+0x1c8/0x434 [ 44.685690][ T4018] sock_diag_rcv_msg+0x174/0x39c [ 44.686919][ T4018] netlink_rcv_skb+0x20c/0x3b8 [ 44.688095][ T4018] sock_diag_rcv+0x3c/0x54 [ 44.689226][ T4018] netlink_unicast+0x664/0x938 [ 44.690481][ T4018] netlink_sendmsg+0x844/0xb38 [ 44.691703][ T4018] ____sys_sendmsg+0x584/0x870 [ 44.692881][ T4018] ___sys_sendmsg+0x214/0x294 [ 44.694037][ T4018] __arm64_sys_sendmsg+0x1ac/0x25c [ 44.695374][ T4018] invoke_syscall+0x98/0x2b8 [ 44.696536][ T4018] el0_svc_common+0x138/0x258 [ 44.697792][ T4018] do_el0_svc+0x58/0x14c [ 44.698790][ T4018] el0_svc+0x7c/0x1f0 [ 44.699799][ T4018] el0t_64_sync_handler+0x84/0xe4 [ 44.701062][ T4018] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 45.650122][ T4105] BUG: sleeping function called from invalid context at net/core/sock.c:3285 [ 45.652465][ T4105] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4105, name: syz-executor941 [ 45.654840][ T4105] INFO: lockdep is turned off. [ 45.656197][ T4105] Preemption disabled at: [ 45.656208][ T4105] [] mptcp_diag_dump+0x7b0/0x10dc [ 45.659104][ T4105] CPU: 0 PID: 4105 Comm: syz-executor941 Tainted: G W 5.15.176-syzkaller #0 [ 45.661697][ T4105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 45.664170][ T4105] Call trace: [ 45.664990][ T4105] dump_backtrace+0x0/0x530 [ 45.666182][ T4105] show_stack+0x2c/0x3c [ 45.667316][ T4105] dump_stack_lvl+0x108/0x170 [ 45.668488][ T4105] dump_stack+0x1c/0x58 [ 45.669613][ T4105] ___might_sleep+0x380/0x4dc [ 45.670830][ T4105] __might_sleep+0x98/0xf0 [ 45.671924][ T4105] __lock_sock_fast+0x3c/0xf0 [ 45.673066][ T4105] mptcp_diag_get_info+0x210/0x8a0 [ 45.674425][ T4105] inet_sk_diag_fill+0xcb8/0x17b4 [ 45.675714][ T4105] mptcp_diag_dump+0xb4c/0x10dc [ 45.676956][ T4105] __inet_diag_dump+0x1e8/0x33c [ 45.678115][ T4105] inet_diag_dump_compat+0x17c/0x288 [ 45.679403][ T4105] netlink_dump+0x4a8/0xad0 [ 45.680624][ T4105] __netlink_dump_start+0x474/0x6d4 [ 45.681984][ T4105] inet_diag_rcv_msg_compat+0x1c8/0x434 [ 45.683552][ T4105] sock_diag_rcv_msg+0x174/0x39c [ 45.684821][ T4105] netlink_rcv_skb+0x20c/0x3b8 [ 45.686005][ T4105] sock_diag_rcv+0x3c/0x54 [ 45.687151][ T4105] netlink_unicast+0x664/0x938 [ 45.688395][ T4105] netlink_sendmsg+0x844/0xb38 [ 45.689551][ T4105] ____sys_sendmsg+0x584/0x870 [ 45.690771][ T4105] ___sys_sendmsg+0x214/0x294 [ 45.691973][ T4105] __arm64_sys_sendmsg+0x1ac/0x25c [ 45.693235][ T4105] invoke_syscall+0x98/0x2b8 [ 45.694382][ T4105] el0_svc_common+0x138/0x258 [ 45.695492][ T4105] do_el0_svc+0x58/0x14c [ 45.696577][ T4105] el0_svc+0x7c/0x1f0 [ 45.697541][ T4105] el0t_64_sync_handler+0x84/0xe4 [ 45.698980][ T4105] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 46.648306][ T4192] BUG: sleeping function called from invalid context at net/core/sock.c:3285 [ 46.650533][ T4192] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4192, name: syz-executor941 [ 46.652940][ T4192] INFO: lockdep is turned off. [ 46.654056][ T4192] Preemption disabled at: [ 46.654066][ T4192] [] mptcp_diag_dump+0x7b0/0x10dc [ 46.657557][ T4192] CPU: 0 PID: 4192 Comm: syz-executor941 Tainted: G W 5.15.176-syzkaller #0 [ 46.659997][ T4192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 46.662454][ T4192] Call trace: [ 46.663217][ T4192] dump_backtrace+0x0/0x530 [ 46.664322][ T4192] show_stack+0x2c/0x3c [ 46.665353][ T4192] dump_stack_lvl+0x108/0x170 [ 46.666549][ T4192] dump_stack+0x1c/0x58 [ 46.667568][ T4192] ___might_sleep+0x380/0x4dc [ 46.668796][ T4192] __might_sleep+0x98/0xf0 [ 46.669935][ T4192] __lock_sock_fast+0x3c/0xf0 [ 46.671129][ T4192] mptcp_diag_get_info+0x210/0x8a0 [ 46.672374][ T4192] inet_sk_diag_fill+0xcb8/0x17b4 [ 46.673603][ T4192] mptcp_diag_dump+0xb4c/0x10dc [ 46.674802][ T4192] __inet_diag_dump+0x1e8/0x33c [ 46.676081][ T4192] inet_diag_dump_compat+0x17c/0x288 [ 46.677380][ T4192] netlink_dump+0x4a8/0xad0 [ 46.678466][ T4192] __netlink_dump_start+0x474/0x6d4 [ 46.679798][ T4192] inet_diag_rcv_msg_compat+0x1c8/0x434 [ 46.681155][ T4192] sock_diag_rcv_msg+0x174/0x39c [ 46.682393][ T4192] netlink_rcv_skb+0x20c/0x3b8 [ 46.683562][ T4192] sock_diag_rcv+0x3c/0x54 [ 46.684632][ T4192] netlink_unicast+0x664/0x938 [ 46.685869][ T4192] netlink_sendmsg+0x844/0xb38 [ 46.687067][ T4192] ____sys_sendmsg+0x584/0x870 [ 46.688279][ T4192] ___sys_sendmsg+0x214/0x294 [ 46.689429][ T4192] __arm64_sys_sendmsg+0x1ac/0x25c [ 46.690704][ T4192] invoke_syscall+0x98/0x2b8 [ 46.692001][ T4192] el0_svc_common+0x138/0x258 [ 46.693175][ T4192] do_el0_svc+0x58/0x14c [ 46.694223][ T4192] el0_svc+0x7c/0x1f0 [ 46.695250][ T4192] el0t_64_sync_handler+0x84/0xe4 [ 46.696588][ T4192] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 47.647892][ T4279] BUG: sleeping function called from invalid context at net/core/sock.c:3285 [ 47.650197][ T4279] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4279, name: syz-executor941 [ 47.652587][ T4279] INFO: lockdep is turned off. [ 47.653787][ T4279] Preemption disabled at: [ 47.653797][ T4279] [] mptcp_diag_dump+0x7b0/0x10dc [ 47.656957][ T4279] CPU: 1 PID: 4279 Comm: syz-executor941 Tainted: G W 5.15.176-syzkaller #0 [ 47.659465][ T4279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 47.661906][ T4279] Call trace: [ 47.662679][ T4279] dump_backtrace+0x0/0x530 [ 47.663801][ T4279] show_stack+0x2c/0x3c [ 47.664874][ T4279] dump_stack_lvl+0x108/0x170 [ 47.666016][ T4279] dump_stack+0x1c/0x58 [ 47.667079][ T4279] ___might_sleep+0x380/0x4dc [ 47.668278][ T4279] __might_sleep+0x98/0xf0 [ 47.669397][ T4279] __lock_sock_fast+0x3c/0xf0 [ 47.670562][ T4279] mptcp_diag_get_info+0x210/0x8a0 [ 47.671833][ T4279] inet_sk_diag_fill+0xcb8/0x17b4 [ 47.673134][ T4279] mptcp_diag_dump+0xb4c/0x10dc [ 47.674340][ T4279] __inet_diag_dump+0x1e8/0x33c [ 47.675568][ T4279] inet_diag_dump_compat+0x17c/0x288 [ 47.676901][ T4279] netlink_dump+0x4a8/0xad0 [ 47.678038][ T4279] __netlink_dump_start+0x474/0x6d4 [ 47.679336][ T4279] inet_diag_rcv_msg_compat+0x1c8/0x434 [ 47.680682][ T4279] sock_diag_rcv_msg+0x174/0x39c [ 47.681956][ T4279] netlink_rcv_skb+0x20c/0x3b8 [ 47.683101][ T4279] sock_diag_rcv+0x3c/0x54 [ 47.684192][ T4279] netlink_unicast+0x664/0x938 [ 47.685303][ T4279] netlink_sendmsg+0x844/0xb38 [ 47.686435][ T4279] ____sys_sendmsg+0x584/0x870 [ 47.687708][ T4279] ___sys_sendmsg+0x214/0x294 [ 47.688890][ T4279] __arm64_sys_sendmsg+0x1ac/0x25c [ 47.690220][ T4279] invoke_syscall+0x98/0x2b8 [ 47.691432][ T4279] el0_svc_common+0x138/0x258 [ 47.692699][ T4279] do_el0_svc+0x58/0x14c [ 47.693776][ T4279] el0_svc+0x7c/0x1f0 [ 47.694796][ T4279] el0t_64_sync_handler+0x84/0xe4 [ 47.696124][ T4279] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 48.646432][ T4366] BUG: sleeping function called from invalid context at net/core/sock.c:3285 [ 48.648681][ T4366] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4366, name: syz-executor941 [ 48.651058][ T4366] INFO: lockdep is turned off. [ 48.652187][ T4366] Preemption disabled at: [ 48.652197][ T4366] [] mptcp_diag_dump+0x7b0/0x10dc [ 48.655014][ T4366] CPU: 1 PID: 4366 Comm: syz-executor941 Tainted: G W 5.15.176-syzkaller #0 [ 48.657540][ T4366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 48.660172][ T4366] Call trace: [ 48.661063][ T4366] dump_backtrace+0x0/0x530 [ 48.662242][ T4366] show_stack+0x2c/0x3c [ 48.663307][ T4366] dump_stack_lvl+0x108/0x170 [ 48.664496][ T4366] dump_stack+0x1c/0x58 [ 48.665571][ T4366] ___might_sleep+0x380/0x4dc [ 48.666734][ T4366] __might_sleep+0x98/0xf0 [ 48.667857][ T4366] __lock_sock_fast+0x3c/0xf0 [ 48.669006][ T4366] mptcp_diag_get_info+0x210/0x8a0 [ 48.670183][ T4366] inet_sk_diag_fill+0xcb8/0x17b4 [ 48.671422][ T4366] mptcp_diag_dump+0xb4c/0x10dc [ 48.672650][ T4366] __inet_diag_dump+0x1e8/0x33c [ 48.673873][ T4366] inet_diag_dump_compat+0x17c/0x288 [ 48.675235][ T4366] netlink_dump+0x4a8/0xad0 [ 48.676377][ T4366] __netlink_dump_start+0x474/0x6d4 [ 48.677752][ T4366] inet_diag_rcv_msg_compat+0x1c8/0x434 [ 48.679227][ T4366] sock_diag_rcv_msg+0x174/0x39c [ 48.680480][ T4366] netlink_rcv_skb+0x20c/0x3b8 [ 48.681648][ T4366] sock_diag_rcv+0x3c/0x54 [ 48.682824][ T4366] netlink_unicast+0x664/0x938 [ 48.684093][ T4366] netlink_sendmsg+0x844/0xb38 [ 48.685288][ T4366] ____sys_sendmsg+0x584/0x870 [ 48.686476][ T4366] ___sys_sendmsg+0x214/0x294 [ 48.687680][ T4366] __arm64_sys_sendmsg+0x1ac/0x25c [ 48.689017][ T4366] invoke_syscall+0x98/0x2b8 [ 48.690204][ T4366] el0_svc_common+0x138/0x258 [ 48.691460][ T4366] do_el0_svc+0x58/0x14c [ 48.692475][ T4366] el0_svc+0x7c/0x1f0 [ 48.693431][ T4366] el0t_64_sync_handler+0x84/0xe4 [ 48.694654][ T4366] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 49.654649][ T4454] BUG: sleeping function called from invalid context at net/core/sock.c:3285 [ 49.656950][ T4454] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4454, name: syz-executor941 [ 49.659094][ T4454] INFO: lockdep is turned off. [ 49.660153][ T4454] Preemption disabled at: [ 49.660162][ T4454] [] mptcp_diag_dump+0x7b0/0x10dc [ 49.662668][ T4454] CPU: 1 PID: 4454 Comm: syz-executor941 Tainted: G W 5.15.176-syzkaller #0 [ 49.664981][ T4454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 49.667408][ T4454] Call trace: [ 49.668194][ T4454] dump_backtrace+0x0/0x530 [ 49.669239][ T4454] show_stack+0x2c/0x3c [ 49.670192][ T4454] dump_stack_lvl+0x108/0x170 [ 49.671328][ T4454] dump_stack+0x1c/0x58 [ 49.672287][ T4454] ___might_sleep+0x380/0x4dc [ 49.673401][ T4454] __might_sleep+0x98/0xf0 [ 49.674419][ T4454] __lock_sock_fast+0x3c/0xf0 [ 49.675529][ T4454] mptcp_diag_get_info+0x210/0x8a0 [ 49.676707][ T4454] inet_sk_diag_fill+0xcb8/0x17b4 [ 49.678035][ T4454] mptcp_diag_dump+0xb4c/0x10dc [ 49.679200][ T4454] __inet_diag_dump+0x1e8/0x33c [ 49.680425][ T4454] inet_diag_dump_compat+0x17c/0x288 [ 49.681652][ T4454] netlink_dump+0x4a8/0xad0 [ 49.682694][ T4454] __netlink_dump_start+0x474/0x6d4 [ 49.684030][ T4454] inet_diag_rcv_msg_compat+0x1c8/0x434 [ 49.685394][ T4454] sock_diag_rcv_msg+0x174/0x39c [ 49.686518][ T4454] netlink_rcv_skb+0x20c/0x3b8 [ 49.687632][ T4454] sock_diag_rcv+0x3c/0x54 [ 49.688689][ T4454] netlink_unicast+0x664/0x938 [ 49.690005][ T4454] netlink_sendmsg+0x844/0xb38 [ 49.691194][ T4454] ____sys_sendmsg+0x584/0x870 [ 49.692300][ T4454] ___sys_sendmsg+0x214/0x294 [ 49.693380][ T4454] __arm64_sys_sendmsg+0x1ac/0x25c [ 49.694583][ T4454] invoke_syscall+0x98/0x2b8 [ 49.695703][ T4454] el0_svc_common+0x138/0x258 [ 49.696738][ T4454] do_el0_svc+0x58/0x14c [ 49.697774][ T4454] el0_svc+0x7c/0x1f0 [ 49.698759][ T4454] el0t_64_sync_handler+0x84/0xe4 [ 49.699998][ T4454] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 50.653014][ T4542] BUG: sleeping function called from invalid context at net/core/sock.c:3285 [ 50.655415][ T4542] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4542, name: syz-executor941 [ 50.658226][ T4542] INFO: lockdep is turned off. [ 50.659382][ T4542] Preemption disabled at: [ 50.659393][ T4542] [] mptcp_diag_dump+0x7b0/0x10dc [ 50.662105][ T4542] CPU: 0 PID: 4542 Comm: syz-executor941 Tainted: G W 5.15.176-syzkaller #0 [ 50.664525][ T4542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 50.667179][ T4542] Call trace: [ 50.667998][ T4542] dump_backtrace+0x0/0x530 [ 50.669175][ T4542] show_stack+0x2c/0x3c [ 50.670298][ T4542] dump_stack_lvl+0x108/0x170 [ 50.671590][ T4542] dump_stack+0x1c/0x58 [ 50.672617][ T4542] ___might_sleep+0x380/0x4dc [ 50.673858][ T4542] __might_sleep+0x98/0xf0 [ 50.675079][ T4542] __lock_sock_fast+0x3c/0xf0 [ 50.676361][ T4542] mptcp_diag_get_info+0x210/0x8a0 [ 50.677735][ T4542] inet_sk_diag_fill+0xcb8/0x17b4 [ 50.679030][ T4542] mptcp_diag_dump+0xb4c/0x10dc [ 50.680270][ T4542] __inet_diag_dump+0x1e8/0x33c [ 50.681578][ T4542] inet_diag_dump_compat+0x17c/0x288 [ 50.682933][ T4542] netlink_dump+0x4a8/0xad0 [ 50.684147][ T4542] __netlink_dump_start+0x474/0x6d4 [ 50.685577][ T4542] inet_diag_rcv_msg_compat+0x1c8/0x434 [ 50.686972][ T4542] sock_diag_rcv_msg+0x174/0x39c [ 50.688206][ T4542] netlink_rcv_skb+0x20c/0x3b8 [ 50.689360][ T4542] sock_diag_rcv+0x3c/0x54 [ 50.690495][ T4542] netlink_unicast+0x664/0x938 [ 50.691727][ T4542] netlink_sendmsg+0x844/0xb38 [ 50.692943][ T4542] ____sys_sendmsg+0x584/0x870 [ 50.694146][ T4542] ___sys_sendmsg+0x214/0x294 [ 50.695349][ T4542] __arm64_sys_sendmsg+0x1ac/0x25c [ 50.696660][ T4542] invoke_syscall+0x98/0x2b8 [ 50.697796][ T4542] el0_svc_common+0x138/0x258 [ 50.699008][ T4542] do_el0_svc+0x58/0x14c [ 50.700107][ T4542] el0_svc+0x7c/0x1f0 [ 50.701126][ T4542] el0t_64_sync_handler+0x84/0xe4 [ 50.702401][ T4542] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 51.650954][ T4629] BUG: sleeping function called from invalid context at net/core/sock.c:3285 [ 51.653206][ T4629] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4629, name: syz-executor941 [ 51.655605][ T4629] INFO: lockdep is turned off. [ 51.657327][ T4629] Preemption disabled at: [ 51.657338][ T4629] [] mptcp_diag_dump+0x7b0/0x10dc [ 51.660032][ T4629] CPU: 0 PID: 4629 Comm: syz-executor941 Tainted: G W 5.15.176-syzkaller #0 [ 51.662448][ T4629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 51.664944][ T4629] Call trace: [ 51.665732][ T4629] dump_backtrace+0x0/0x530 [ 51.666944][ T4629] show_stack+0x2c/0x3c [ 51.668018][ T4629] dump_stack_lvl+0x108/0x170 [ 51.669199][ T4629] dump_stack+0x1c/0x58 [ 51.670279][ T4629] ___might_sleep+0x380/0x4dc [ 51.671455][ T4629] __might_sleep+0x98/0xf0 [ 51.672577][ T4629] __lock_sock_fast+0x3c/0xf0 [ 51.673739][ T4629] mptcp_diag_get_info+0x210/0x8a0 [ 51.675052][ T4629] inet_sk_diag_fill+0xcb8/0x17b4 [ 51.676342][ T4629] mptcp_diag_dump+0xb4c/0x10dc [ 51.677563][ T4629] __inet_diag_dump+0x1e8/0x33c [ 51.678781][ T4629] inet_diag_dump_compat+0x17c/0x288 [ 51.680112][ T4629] netlink_dump+0x4a8/0xad0 [ 51.681243][ T4629] __netlink_dump_start+0x474/0x6d4 [ 51.682587][ T4629] inet_diag_rcv_msg_compat+0x1c8/0x434 [ 51.684091][ T4629] sock_diag_rcv_msg+0x174/0x39c [ 51.685332][ T4629] netlink_rcv_skb+0x20c/0x3b8 [ 51.686540][ T4629] sock_diag_rcv+0x3c/0x54 [ 51.687649][ T4629] netlink_unicast+0x664/0x938 [ 51.688928][ T4629] netlink_sendmsg+0x844/0xb38 [ 51.690215][ T4629] ____sys_sendmsg+0x584/0x870 [ 51.691463][ T4629] ___sys_sendmsg+0x214/0x294 [ 51.692666][ T4629] __arm64_sys_sendmsg+0x1ac/0x25c [ 51.693961][ T4629] invoke_syscall+0x98/0x2b8 [ 51.695155][ T4629] el0_svc_common+0x138/0x258 [ 51.696315][ T4629] do_el0_svc+0x58/0x14c [ 51.697386][ T4629] el0_svc+0x7c/0x1f0 [ 51.698437][ T4629] el0t_64_sync_handler+0x84/0xe4 [ 51.699704][ T4629] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 52.647447][ T4716] BUG: sleeping function called from invalid context at net/core/sock.c:3285 [ 52.649755][ T4716] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4716, name: syz-executor941 [ 52.652180][ T4716] INFO: lockdep is turned off. [ 52.653357][ T4716] Preemption disabled at: [ 52.653368][ T4716] [] mptcp_diag_dump+0x7b0/0x10dc [ 52.656307][ T4716] CPU: 0 PID: 4716 Comm: syz-executor941 Tainted: G W 5.15.176-syzkaller #0 [ 52.658815][ T4716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 52.661407][ T4716] Call trace: [ 52.662291][ T4716] dump_backtrace+0x0/0x530 [ 52.663406][ T4716] show_stack+0x2c/0x3c [ 52.664380][ T4716] dump_stack_lvl+0x108/0x170 [ 52.665560][ T4716] dump_stack+0x1c/0x58 [ 52.666567][ T4716] ___might_sleep+0x380/0x4dc [ 52.667790][ T4716] __might_sleep+0x98/0xf0 [ 52.668865][ T4716] __lock_sock_fast+0x3c/0xf0 [ 52.670058][ T4716] mptcp_diag_get_info+0x210/0x8a0 [ 52.671406][ T4716] inet_sk_diag_fill+0xcb8/0x17b4 [ 52.672674][ T4716] mptcp_diag_dump+0xb4c/0x10dc [ 52.673906][ T4716] __inet_diag_dump+0x1e8/0x33c [ 52.675169][ T4716] inet_diag_dump_compat+0x17c/0x288 [ 52.676625][ T4716] netlink_dump+0x4a8/0xad0 [ 52.677851][ T4716] __netlink_dump_start+0x474/0x6d4 [ 52.679163][ T4716] inet_diag_rcv_msg_compat+0x1c8/0x434 [ 52.680545][ T4716] sock_diag_rcv_msg+0x174/0x39c [ 52.681764][ T4716] netlink_rcv_skb+0x20c/0x3b8 [ 52.682980][ T4716] sock_diag_rcv+0x3c/0x54 [ 52.684161][ T4716] netlink_unicast+0x664/0x938 [ 52.685367][ T4716] netlink_sendmsg+0x844/0xb38 [ 52.686572][ T4716] ____sys_sendmsg+0x584/0x870 [ 52.687751][ T4716] ___sys_sendmsg+0x214/0x294 [ 52.688983][ T4716] __arm64_sys_sendmsg+0x1ac/0x25c [ 52.690298][ T4716] invoke_syscall+0x98/0x2b8 [ 52.691477][ T4716] el0_svc_common+0x138/0x258 [ 52.692678][ T4716] do_el0_svc+0x58/0x14c [ 52.693800][ T4716] el0_svc+0x7c/0x1f0 [ 52.694854][ T4716] el0t_64_sync_handler+0x84/0xe4 [ 52.696156][ T4716] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 53.655267][ T4804] BUG: sleeping function called from invalid context at net/core/sock.c:3285 [ 53.657977][ T4804] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4804, name: syz-executor941 [ 53.660347][ T4804] INFO: lockdep is turned off. [ 53.661514][ T4804] Preemption disabled at: [ 53.661525][ T4804] [] mptcp_diag_dump+0x7b0/0x10dc [ 53.664283][ T4804] CPU: 0 PID: 4804 Comm: syz-executor941 Tainted: G W 5.15.176-syzkaller #0 [ 53.666794][ T4804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 53.669321][ T4804] Call trace: [ 53.670275][ T4804] dump_backtrace+0x0/0x530 [ 53.671431][ T4804] show_stack+0x2c/0x3c [ 53.672480][ T4804] dump_stack_lvl+0x108/0x170 [ 53.673693][ T4804] dump_stack+0x1c/0x58 [ 53.674795][ T4804] ___might_sleep+0x380/0x4dc [ 53.675910][ T4804] __might_sleep+0x98/0xf0 [ 53.677011][ T4804] __lock_sock_fast+0x3c/0xf0 [ 53.678255][ T4804] mptcp_diag_get_info+0x210/0x8a0 [ 53.679578][ T4804] inet_sk_diag_fill+0xcb8/0x17b4 [ 53.680814][ T4804] mptcp_diag_dump+0xb4c/0x10dc [ 53.682050][ T4804] __inet_diag_dump+0x1e8/0x33c [ 53.683332][ T4804] inet_diag_dump_compat+0x17c/0x288 [ 53.684756][ T4804] netlink_dump+0x4a8/0xad0 [ 53.685951][ T4804] __netlink_dump_start+0x474/0x6d4 [ 53.687251][ T4804] inet_diag_rcv_msg_compat+0x1c8/0x434 [ 53.688809][ T4804] sock_diag_rcv_msg+0x174/0x39c [ 53.690096][ T4804] netlink_rcv_skb+0x20c/0x3b8 [ 53.691298][ T4804] sock_diag_rcv+0x3c/0x54 [ 53.692466][ T4804] netlink_unicast+0x664/0x938 [ 53.693584][ T4804] netlink_sendmsg+0x844/0xb38 [ 53.694770][ T4804] ____sys_sendmsg+0x584/0x870 [ 53.695994][ T4804] ___sys_sendmsg+0x214/0x294 [ 53.697180][ T4804] __arm64_sys_sendmsg+0x1ac/0x25c [ 53.698483][ T4804] invoke_syscall+0x98/0x2b8 [ 53.699600][ T4804] el0_svc_common+0x138/0x258 [ 53.700815][ T4804] do_el0_svc+0x58/0x14c [ 53.701972][ T4804] el0_svc+0x7c/0x1f0 [ 53.702982][ T4804] el0t_64_sync_handler+0x84/0xe4 [ 53.704237][ T4804] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program