------------[ cut here ]------------ WARNING: CPU: 1 PID: 4020 at kernel/cgroup/cgroup.c:1424 cset_cgroup_from_root kernel/cgroup/cgroup.c:1424 [inline] WARNING: CPU: 1 PID: 4020 at kernel/cgroup/cgroup.c:1424 cgroup_path_ns_locked+0x270/0x2dc kernel/cgroup/cgroup.c:2302 Modules linked in: CPU: 1 PID: 4020 Comm: syz-executor377 Not tainted 5.15.166-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 pstate: 804000c5 (Nzcv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : cset_cgroup_from_root kernel/cgroup/cgroup.c:1424 [inline] pc : cgroup_path_ns_locked+0x270/0x2dc kernel/cgroup/cgroup.c:2302 lr : cset_cgroup_from_root kernel/cgroup/cgroup.c:1424 [inline] lr : cgroup_path_ns_locked+0x270/0x2dc kernel/cgroup/cgroup.c:2302 sp : ffff80001d0c7750 x29: ffff80001d0c7750 x28: ffff0000c9f35690 x27: 1ffff00002956069 x26: ffff800014ca9500 x25: ffff800014ca70c0 x24: dfff800000000000 x23: ffff800014ab0000 x22: 0000000000000000 x21: ffff800014ca70d0 x20: ffff0000cd706000 x19: 0000000000001000 x18: ffff80001d0c74a0 x17: ffff800008978c10 x16: ffff8000082eae1c x15: 000000000000b824 x14: 00000000139b590d x13: dfff800000000000 x12: ffff700003a18edc x11: 0000000000000001 x10: 0000000000000000 x9 : ffff0000da5e9b40 x8 : ffff800008444a08 x7 : 0000000000000000 x6 : 0000000000000000 x5 : ffff8000177792f8 x4 : 0000000000000008 x3 : ffff800014ca97c0 x2 : 0000000000001000 x1 : 0000000000000000 x0 : 0000000000000000 Call trace: cset_cgroup_from_root kernel/cgroup/cgroup.c:1424 [inline] cgroup_path_ns_locked+0x270/0x2dc kernel/cgroup/cgroup.c:2302 proc_cpuset_show+0x298/0x42c kernel/cgroup/cpuset.c:3787 proc_single_show+0xf4/0x1cc fs/proc/base.c:778 seq_read_iter+0x3e0/0xc44 fs/seq_file.c:230 seq_read+0x388/0x4ec fs/seq_file.c:162 vfs_read+0x278/0xb18 fs/read_write.c:483 ksys_read+0x15c/0x26c fs/read_write.c:623 __do_sys_read fs/read_write.c:633 [inline] __se_sys_read fs/read_write.c:631 [inline] __arm64_sys_read+0x7c/0x90 fs/read_write.c:631 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x7c/0x1f0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0x84/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 13390 hardirqs last enabled at (13389): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (13389): [] _raw_spin_unlock_irqrestore+0xac/0x158 kernel/locking/spinlock.c:194 hardirqs last disabled at (13390): [] __raw_spin_lock_irq include/linux/spinlock_api_smp.h:126 [inline] hardirqs last disabled at (13390): [] _raw_spin_lock_irq+0x38/0x13c kernel/locking/spinlock.c:170 softirqs last enabled at (13004): [] softirq_handle_end kernel/softirq.c:401 [inline] softirqs last enabled at (13004): [] handle_softirqs+0xb88/0xdbc kernel/softirq.c:586 softirqs last disabled at (12989): [] __do_softirq kernel/softirq.c:592 [inline] softirqs last disabled at (12989): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (12989): [] invoke_softirq kernel/softirq.c:439 [inline] softirqs last disabled at (12989): [] __irq_exit_rcu+0x268/0x4d8 kernel/softirq.c:641 ---[ end trace 45312ce5dc340f79 ]---