Warning: Permanently added '10.128.0.160' (ED25519) to the list of known hosts. executing program [ 38.376849][ T4019] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 38.379454][ T4019] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4019, name: syz-executor168 [ 38.382034][ T4019] 1 lock held by syz-executor168/4019: [ 38.383407][ T4019] #0: ffff800014cb6ad8 (css_set_lock){....}-{2:2}, at: cgroup_get_from_path+0x30/0x300 [ 38.385921][ T4019] irq event stamp: 556 [ 38.386911][ T4019] hardirqs last enabled at (555): [] finish_lock_switch+0xbc/0x1e8 [ 38.389293][ T4019] hardirqs last disabled at (556): [] _raw_spin_lock_irq+0x38/0x13c [ 38.391728][ T4019] softirqs last enabled at (538): [] release_sock+0x1e4/0x270 [ 38.394102][ T4019] softirqs last disabled at (536): [] release_sock+0x3c/0x270 [ 38.396466][ T4019] Preemption disabled at: [ 38.396476][ T4019] [] cgroup_get_from_path+0x30/0x300 [ 38.399167][ T4019] CPU: 1 PID: 4019 Comm: syz-executor168 Not tainted 5.15.164-syzkaller #0 [ 38.401392][ T4019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 38.404048][ T4019] Call trace: [ 38.404930][ T4019] dump_backtrace+0x0/0x530 [ 38.406112][ T4019] show_stack+0x2c/0x3c [ 38.407157][ T4019] dump_stack_lvl+0x108/0x170 [ 38.408357][ T4019] dump_stack+0x1c/0x58 [ 38.409446][ T4019] ___might_sleep+0x380/0x4dc [ 38.410670][ T4019] __might_sleep+0x98/0xf0 [ 38.411836][ T4019] down_read+0x34/0x398 [ 38.412877][ T4019] kernfs_walk_and_get_ns+0x8c/0x310 [ 38.414317][ T4019] cgroup_get_from_path+0x64/0x300 [ 38.415769][ T4019] cgroup_mt_check_v1+0x18c/0x278 [ 38.417061][ T4019] xt_check_match+0x338/0x914 [ 38.418415][ T4019] translate_table+0x10cc/0x1ac8 [ 38.419570][ T4019] do_ip6t_set_ctl+0xb8c/0x1164 [ 38.420937][ T4019] nf_setsockopt+0x270/0x290 [ 38.422162][ T4019] ipv6_setsockopt+0x1f78/0x3d74 [ 38.423664][ T4019] udpv6_setsockopt+0xa8/0xc0 [ 38.424990][ T4019] sock_common_setsockopt+0xb0/0xcc [ 38.426321][ T4019] __sys_setsockopt+0x3a8/0x6b4 [ 38.427659][ T4019] __arm64_sys_setsockopt+0xb8/0xd4 [ 38.429203][ T4019] invoke_syscall+0x98/0x2b8 [ 38.430375][ T4019] el0_svc_common+0x138/0x258 [ 38.431505][ T4019] do_el0_svc+0x58/0x14c [ 38.432716][ T4019] el0_svc+0x7c/0x1f0 [ 38.433775][ T4019] el0t_64_sync_handler+0x84/0xe4 [ 38.435128][ T4019] el0t_64_sync+0x1a0/0x1a4 [ 38.436279][ T4019] [ 38.436843][ T4019] ============================= [ 38.438037][ T4019] [ BUG: Invalid wait context ] [ 38.439562][ T4019] 5.15.164-syzkaller #0 Tainted: G W [ 38.441289][ T4019] ----------------------------- [ 38.442637][ T4019] syz-executor168/4019 is trying to lock: [ 38.444208][ T4019] ffff800014db7410 (kernfs_rwsem){++++}-{3:3}, at: kernfs_walk_and_get_ns+0x8c/0x310 [ 38.446740][ T4019] other info that might help us debug this: [ 38.448405][ T4019] context-{4:4} [ 38.449354][ T4019] 1 lock held by syz-executor168/4019: [ 38.450915][ T4019] #0: ffff800014cb6ad8 (css_set_lock){....}-{2:2}, at: cgroup_get_from_path+0x30/0x300 [ 38.453512][ T4019] stack backtrace: [ 38.454443][ T4019] CPU: 1 PID: 4019 Comm: syz-executor168 Tainted: G W 5.15.164-syzkaller #0 [ 38.457102][ T4019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 38.459802][ T4019] Call trace: [ 38.460670][ T4019] dump_backtrace+0x0/0x530 [ 38.461966][ T4019] show_stack+0x2c/0x3c [ 38.463021][ T4019] dump_stack_lvl+0x108/0x170 [ 38.464215][ T4019] dump_stack+0x1c/0x58 [ 38.465279][ T4019] __lock_acquire+0x1af0/0x7638 [ 38.466785][ T4019] lock_acquire+0x240/0x77c [ 38.468297][ T4019] down_read+0xc0/0x398 [ 38.469402][ T4019] kernfs_walk_and_get_ns+0x8c/0x310 [ 38.470821][ T4019] cgroup_get_from_path+0x64/0x300 [ 38.472161][ T4019] cgroup_mt_check_v1+0x18c/0x278 [ 38.473521][ T4019] xt_check_match+0x338/0x914 [ 38.474853][ T4019] translate_table+0x10cc/0x1ac8 [ 38.476043][ T4019] do_ip6t_set_ctl+0xb8c/0x1164 [ 38.477406][ T4019] nf_setsockopt+0x270/0x290 [ 38.478733][ T4019] ipv6_setsockopt+0x1f78/0x3d74 [ 38.480068][ T4019] udpv6_setsockopt+0xa8/0xc0 [ 38.481232][ T4019] sock_common_setsockopt+0xb0/0xcc [ 38.482580][ T4019] __sys_setsockopt+0x3a8/0x6b4 [ 38.483685][ T4019] __arm64_sys_setsockopt+0xb8/0xd4 [ 38.485038][ T4019] invoke_syscall+0x98/0x2b8 [ 38.486321][ T4019] el0_svc_common+0x138/0x258 [ 38.487646][ T4019] do_el0_svc+0x58/0x14c [ 38.488836][ T4019] el0_svc+0x7c/0x1f0 [ 38.489877][ T4019] el0t_64_sync_handler+0x84/0xe4 [ 38.491185][ T4019] el0t_64_sync+0x1a0/0x1a4 [ 38.492603][ T4019] xt_cgroup: invalid path, errno=-2 executing program [ 38.499020][ T4020] xt_cgroup: invalid path, errno=-2 executing program [ 38.509828][ T4021] xt_cgroup: invalid path, errno=-2 executing program [ 38.520629][ T4022] xt_cgroup: invalid path, errno=-2 executing program [ 38.531410][ T4023] xt_cgroup: invalid path, errno=-2 executing program [ 38.542273][ T4024] xt_cgroup: invalid path, errno=-2 executing program [ 38.553032][ T4025] xt_cgroup: invalid path, errno=-2 executing program [ 38.563860][ T4026] xt_cgroup: invalid path, errno=-2 executing program [ 38.574685][ T4027] xt_cgroup: invalid path, errno=-2 executing program [ 38.585553][ T4028] xt_cgroup: invalid path, errno=-2 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 39.379395][ T4101] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 39.381780][ T4101] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4101, name: syz-executor168 [ 39.384230][ T4101] INFO: lockdep is turned off. [ 39.385307][ T4101] irq event stamp: 0 [ 39.386377][ T4101] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 39.388038][ T4101] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 39.390251][ T4101] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 39.392688][ T4101] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 39.394614][ T4101] Preemption disabled at: [ 39.394622][ T4101] [] cgroup_get_from_path+0x30/0x300 [ 39.397573][ T4101] CPU: 1 PID: 4101 Comm: syz-executor168 Tainted: G W 5.15.164-syzkaller #0 [ 39.400290][ T4101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 39.402923][ T4101] Call trace: [ 39.403783][ T4101] dump_backtrace+0x0/0x530 [ 39.405008][ T4101] show_stack+0x2c/0x3c [ 39.406068][ T4101] dump_stack_lvl+0x108/0x170 [ 39.407176][ T4101] dump_stack+0x1c/0x58 [ 39.408246][ T4101] ___might_sleep+0x380/0x4dc [ 39.409549][ T4101] __might_sleep+0x98/0xf0 [ 39.410687][ T4101] down_read+0x34/0x398 [ 39.411793][ T4101] kernfs_walk_and_get_ns+0x8c/0x310 [ 39.413352][ T4101] cgroup_get_from_path+0x64/0x300 [ 39.414813][ T4101] cgroup_mt_check_v1+0x18c/0x278 [ 39.416097][ T4101] xt_check_match+0x338/0x914 [ 39.417644][ T4101] translate_table+0x10cc/0x1ac8 [ 39.418999][ T4101] do_ip6t_set_ctl+0xb8c/0x1164 [ 39.420361][ T4101] nf_setsockopt+0x270/0x290 [ 39.421548][ T4101] ipv6_setsockopt+0x1f78/0x3d74 [ 39.422858][ T4101] udpv6_setsockopt+0xa8/0xc0 [ 39.424125][ T4101] sock_common_setsockopt+0xb0/0xcc [ 39.425545][ T4101] __sys_setsockopt+0x3a8/0x6b4 [ 39.426804][ T4101] __arm64_sys_setsockopt+0xb8/0xd4 [ 39.428183][ T4101] invoke_syscall+0x98/0x2b8 [ 39.429380][ T4101] el0_svc_common+0x138/0x258 [ 39.430650][ T4101] do_el0_svc+0x58/0x14c [ 39.431802][ T4101] el0_svc+0x7c/0x1f0 [ 39.432820][ T4101] el0t_64_sync_handler+0x84/0xe4 [ 39.434148][ T4101] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 40.377530][ T4188] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 40.380009][ T4188] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4188, name: syz-executor168 [ 40.382535][ T4188] INFO: lockdep is turned off. [ 40.383773][ T4188] irq event stamp: 0 [ 40.384753][ T4188] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 40.386568][ T4188] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 40.389053][ T4188] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 40.391477][ T4188] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 40.393332][ T4188] Preemption disabled at: [ 40.393340][ T4188] [] cgroup_get_from_path+0x30/0x300 [ 40.396350][ T4188] CPU: 1 PID: 4188 Comm: syz-executor168 Tainted: G W 5.15.164-syzkaller #0 [ 40.399026][ T4188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 40.401704][ T4188] Call trace: [ 40.402573][ T4188] dump_backtrace+0x0/0x530 [ 40.403771][ T4188] show_stack+0x2c/0x3c [ 40.404845][ T4188] dump_stack_lvl+0x108/0x170 [ 40.406115][ T4188] dump_stack+0x1c/0x58 [ 40.407197][ T4188] ___might_sleep+0x380/0x4dc [ 40.408421][ T4188] __might_sleep+0x98/0xf0 [ 40.409583][ T4188] down_read+0x34/0x398 [ 40.410667][ T4188] kernfs_walk_and_get_ns+0x8c/0x310 [ 40.412090][ T4188] cgroup_get_from_path+0x64/0x300 [ 40.413501][ T4188] cgroup_mt_check_v1+0x18c/0x278 [ 40.414826][ T4188] xt_check_match+0x338/0x914 [ 40.416076][ T4188] translate_table+0x10cc/0x1ac8 [ 40.417365][ T4188] do_ip6t_set_ctl+0xb8c/0x1164 [ 40.418658][ T4188] nf_setsockopt+0x270/0x290 [ 40.419887][ T4188] ipv6_setsockopt+0x1f78/0x3d74 [ 40.421234][ T4188] udpv6_setsockopt+0xa8/0xc0 [ 40.422427][ T4188] sock_common_setsockopt+0xb0/0xcc [ 40.423829][ T4188] __sys_setsockopt+0x3a8/0x6b4 [ 40.425122][ T4188] __arm64_sys_setsockopt+0xb8/0xd4 [ 40.426503][ T4188] invoke_syscall+0x98/0x2b8 [ 40.427727][ T4188] el0_svc_common+0x138/0x258 [ 40.428957][ T4188] do_el0_svc+0x58/0x14c [ 40.430083][ T4188] el0_svc+0x7c/0x1f0 [ 40.431131][ T4188] el0t_64_sync_handler+0x84/0xe4 executing program [ 40.432438][ T4188] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 41.387393][ T4276] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 41.389815][ T4276] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4276, name: syz-executor168 [ 41.392319][ T4276] INFO: lockdep is turned off. [ 41.393513][ T4276] irq event stamp: 0 [ 41.394528][ T4276] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 41.396364][ T4276] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 41.398791][ T4276] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 41.401199][ T4276] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 41.403050][ T4276] Preemption disabled at: [ 41.403057][ T4276] [] cgroup_get_from_path+0x30/0x300 [ 41.406022][ T4276] CPU: 1 PID: 4276 Comm: syz-executor168 Tainted: G W 5.15.164-syzkaller #0 [ 41.408719][ T4276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 41.411423][ T4276] Call trace: [ 41.412293][ T4276] dump_backtrace+0x0/0x530 [ 41.413478][ T4276] show_stack+0x2c/0x3c [ 41.414594][ T4276] dump_stack_lvl+0x108/0x170 [ 41.415806][ T4276] dump_stack+0x1c/0x58 [ 41.416931][ T4276] ___might_sleep+0x380/0x4dc [ 41.418176][ T4276] __might_sleep+0x98/0xf0 [ 41.419307][ T4276] down_read+0x34/0x398 [ 41.420401][ T4276] kernfs_walk_and_get_ns+0x8c/0x310 [ 41.421806][ T4276] cgroup_get_from_path+0x64/0x300 [ 41.423120][ T4276] cgroup_mt_check_v1+0x18c/0x278 [ 41.424456][ T4276] xt_check_match+0x338/0x914 [ 41.425700][ T4276] translate_table+0x10cc/0x1ac8 [ 41.426989][ T4276] do_ip6t_set_ctl+0xb8c/0x1164 [ 41.428243][ T4276] nf_setsockopt+0x270/0x290 [ 41.429440][ T4276] ipv6_setsockopt+0x1f78/0x3d74 [ 41.430770][ T4276] udpv6_setsockopt+0xa8/0xc0 [ 41.431992][ T4276] sock_common_setsockopt+0xb0/0xcc [ 41.433406][ T4276] __sys_setsockopt+0x3a8/0x6b4 [ 41.434704][ T4276] __arm64_sys_setsockopt+0xb8/0xd4 [ 41.436073][ T4276] invoke_syscall+0x98/0x2b8 [ 41.437286][ T4276] el0_svc_common+0x138/0x258 [ 41.438554][ T4276] do_el0_svc+0x58/0x14c [ 41.439676][ T4276] el0_svc+0x7c/0x1f0 [ 41.440719][ T4276] el0t_64_sync_handler+0x84/0xe4 [ 41.442067][ T4276] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 42.394646][ T4364] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 42.397270][ T4364] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4364, name: syz-executor168 [ 42.400024][ T4364] INFO: lockdep is turned off. [ 42.401399][ T4364] irq event stamp: 0 [ 42.402516][ T4364] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 42.404547][ T4364] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 42.407135][ T4364] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 42.409486][ T4364] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 42.411480][ T4364] Preemption disabled at: [ 42.411489][ T4364] [] cgroup_get_from_path+0x30/0x300 [ 42.414508][ T4364] CPU: 0 PID: 4364 Comm: syz-executor168 Tainted: G W 5.15.164-syzkaller #0 [ 42.417232][ T4364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 42.419967][ T4364] Call trace: [ 42.420850][ T4364] dump_backtrace+0x0/0x530 [ 42.422186][ T4364] show_stack+0x2c/0x3c [ 42.423347][ T4364] dump_stack_lvl+0x108/0x170 [ 42.424828][ T4364] dump_stack+0x1c/0x58 [ 42.425966][ T4364] ___might_sleep+0x380/0x4dc [ 42.427294][ T4364] __might_sleep+0x98/0xf0 [ 42.428547][ T4364] down_read+0x34/0x398 [ 42.429700][ T4364] kernfs_walk_and_get_ns+0x8c/0x310 [ 42.431094][ T4364] cgroup_get_from_path+0x64/0x300 [ 42.432479][ T4364] cgroup_mt_check_v1+0x18c/0x278 [ 42.433898][ T4364] xt_check_match+0x338/0x914 [ 42.435203][ T4364] translate_table+0x10cc/0x1ac8 [ 42.436590][ T4364] do_ip6t_set_ctl+0xb8c/0x1164 [ 42.437992][ T4364] nf_setsockopt+0x270/0x290 [ 42.439221][ T4364] ipv6_setsockopt+0x1f78/0x3d74 [ 42.440617][ T4364] udpv6_setsockopt+0xa8/0xc0 [ 42.441940][ T4364] sock_common_setsockopt+0xb0/0xcc [ 42.443367][ T4364] __sys_setsockopt+0x3a8/0x6b4 [ 42.444712][ T4364] __arm64_sys_setsockopt+0xb8/0xd4 [ 42.446241][ T4364] invoke_syscall+0x98/0x2b8 [ 42.447549][ T4364] el0_svc_common+0x138/0x258 [ 42.448815][ T4364] do_el0_svc+0x58/0x14c executing program [ 42.449990][ T4364] el0_svc+0x7c/0x1f0 [ 42.451082][ T4364] el0t_64_sync_handler+0x84/0xe4 [ 42.452458][ T4364] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 43.390823][ T4451] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 43.393298][ T4451] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4451, name: syz-executor168 [ 43.395796][ T4451] INFO: lockdep is turned off. [ 43.397015][ T4451] irq event stamp: 0 [ 43.398038][ T4451] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 43.399855][ T4451] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 43.402181][ T4451] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 43.404628][ T4451] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 43.406527][ T4451] Preemption disabled at: [ 43.406535][ T4451] [] cgroup_get_from_path+0x30/0x300 [ 43.409444][ T4451] CPU: 1 PID: 4451 Comm: syz-executor168 Tainted: G W 5.15.164-syzkaller #0 [ 43.412044][ T4451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 43.414749][ T4451] Call trace: [ 43.415582][ T4451] dump_backtrace+0x0/0x530 [ 43.416767][ T4451] show_stack+0x2c/0x3c [ 43.417848][ T4451] dump_stack_lvl+0x108/0x170 [ 43.419025][ T4451] dump_stack+0x1c/0x58 [ 43.420187][ T4451] ___might_sleep+0x380/0x4dc [ 43.421374][ T4451] __might_sleep+0x98/0xf0 [ 43.422577][ T4451] down_read+0x34/0x398 [ 43.423696][ T4451] kernfs_walk_and_get_ns+0x8c/0x310 executing program [ 43.425082][ T4451] cgroup_get_from_path+0x64/0x300 [ 43.426451][ T4451] cgroup_mt_check_v1+0x18c/0x278 [ 43.427780][ T4451] xt_check_match+0x338/0x914 executing program [ 43.428992][ T4451] translate_table+0x10cc/0x1ac8 [ 43.430292][ T4451] do_ip6t_set_ctl+0xb8c/0x1164 [ 43.431589][ T4451] nf_setsockopt+0x270/0x290 [ 43.432803][ T4451] ipv6_setsockopt+0x1f78/0x3d74 [ 43.434110][ T4451] udpv6_setsockopt+0xa8/0xc0 executing program [ 43.435335][ T4451] sock_common_setsockopt+0xb0/0xcc [ 43.436700][ T4451] __sys_setsockopt+0x3a8/0x6b4 executing program [ 43.437920][ T4451] __arm64_sys_setsockopt+0xb8/0xd4 [ 43.439262][ T4451] invoke_syscall+0x98/0x2b8 [ 43.440450][ T4451] el0_svc_common+0x138/0x258 executing program [ 43.441662][ T4451] do_el0_svc+0x58/0x14c [ 43.442776][ T4451] el0_svc+0x7c/0x1f0 [ 43.443820][ T4451] el0t_64_sync_handler+0x84/0xe4 executing program [ 43.445153][ T4451] el0t_64_sync+0x1a0/0x1a4 [ 43.497128][ T4456] cgroup_mt_check_v1: 427 callbacks suppressed [ 43.497143][ T4456] xt_cgroup: invalid path, errno=-2 [ 43.507886][ T4457] xt_cgroup: invalid path, errno=-2 executing program [ 43.518602][ T4458] xt_cgroup: invalid path, errno=-2 executing program [ 43.529375][ T4459] xt_cgroup: invalid path, errno=-2 executing program [ 43.540131][ T4460] xt_cgroup: invalid path, errno=-2 executing program [ 43.551012][ T4461] xt_cgroup: invalid path, errno=-2 executing program [ 43.561854][ T4462] xt_cgroup: invalid path, errno=-2 executing program [ 43.572685][ T4463] xt_cgroup: invalid path, errno=-2 executing program [ 43.583592][ T4464] xt_cgroup: invalid path, errno=-2 executing program [ 43.594416][ T4465] xt_cgroup: invalid path, errno=-2 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 44.388006][ T4538] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 44.390640][ T4538] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4538, name: syz-executor168 [ 44.393330][ T4538] INFO: lockdep is turned off. [ 44.394693][ T4538] irq event stamp: 0 [ 44.395799][ T4538] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 44.397871][ T4538] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 44.400439][ T4538] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 44.403094][ T4538] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 44.405082][ T4538] Preemption disabled at: [ 44.405099][ T4538] [] cgroup_get_from_path+0x30/0x300 [ 44.408199][ T4538] CPU: 0 PID: 4538 Comm: syz-executor168 Tainted: G W 5.15.164-syzkaller #0 [ 44.410998][ T4538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 44.413825][ T4538] Call trace: [ 44.414682][ T4538] dump_backtrace+0x0/0x530 [ 44.415950][ T4538] show_stack+0x2c/0x3c [ 44.417165][ T4538] dump_stack_lvl+0x108/0x170 [ 44.418483][ T4538] dump_stack+0x1c/0x58 [ 44.419637][ T4538] ___might_sleep+0x380/0x4dc [ 44.420949][ T4538] __might_sleep+0x98/0xf0 [ 44.422172][ T4538] down_read+0x34/0x398 [ 44.423338][ T4538] kernfs_walk_and_get_ns+0x8c/0x310 [ 44.424828][ T4538] cgroup_get_from_path+0x64/0x300 [ 44.426269][ T4538] cgroup_mt_check_v1+0x18c/0x278 [ 44.427665][ T4538] xt_check_match+0x338/0x914 [ 44.428967][ T4538] translate_table+0x10cc/0x1ac8 [ 44.430329][ T4538] do_ip6t_set_ctl+0xb8c/0x1164 [ 44.431691][ T4538] nf_setsockopt+0x270/0x290 [ 44.432958][ T4538] ipv6_setsockopt+0x1f78/0x3d74 [ 44.434336][ T4538] udpv6_setsockopt+0xa8/0xc0 [ 44.435634][ T4538] sock_common_setsockopt+0xb0/0xcc [ 44.437047][ T4538] __sys_setsockopt+0x3a8/0x6b4 [ 44.438383][ T4538] __arm64_sys_setsockopt+0xb8/0xd4 [ 44.439818][ T4538] invoke_syscall+0x98/0x2b8 [ 44.441101][ T4538] el0_svc_common+0x138/0x258 [ 44.442389][ T4538] do_el0_svc+0x58/0x14c executing program [ 44.443502][ T4538] el0_svc+0x7c/0x1f0 [ 44.444611][ T4538] el0t_64_sync_handler+0x84/0xe4 [ 44.446015][ T4538] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 45.388391][ T4625] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 45.390939][ T4625] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4625, name: syz-executor168 [ 45.393576][ T4625] INFO: lockdep is turned off. [ 45.394891][ T4625] irq event stamp: 0 [ 45.395955][ T4625] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 45.397895][ T4625] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 45.400354][ T4625] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 45.402875][ T4625] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 45.404807][ T4625] Preemption disabled at: [ 45.404814][ T4625] [] cgroup_get_from_path+0x30/0x300 [ 45.407827][ T4625] CPU: 0 PID: 4625 Comm: syz-executor168 Tainted: G W 5.15.164-syzkaller #0 [ 45.410705][ T4625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 45.413509][ T4625] Call trace: [ 45.414400][ T4625] dump_backtrace+0x0/0x530 [ 45.415564][ T4625] show_stack+0x2c/0x3c [ 45.416732][ T4625] dump_stack_lvl+0x108/0x170 [ 45.418107][ T4625] dump_stack+0x1c/0x58 [ 45.419285][ T4625] ___might_sleep+0x380/0x4dc [ 45.420507][ T4625] __might_sleep+0x98/0xf0 [ 45.421760][ T4625] down_read+0x34/0x398 [ 45.422901][ T4625] kernfs_walk_and_get_ns+0x8c/0x310 [ 45.424292][ T4625] cgroup_get_from_path+0x64/0x300 [ 45.425695][ T4625] cgroup_mt_check_v1+0x18c/0x278 [ 45.427029][ T4625] xt_check_match+0x338/0x914 [ 45.428340][ T4625] translate_table+0x10cc/0x1ac8 [ 45.429698][ T4625] do_ip6t_set_ctl+0xb8c/0x1164 [ 45.431033][ T4625] nf_setsockopt+0x270/0x290 [ 45.432288][ T4625] ipv6_setsockopt+0x1f78/0x3d74 [ 45.433737][ T4625] udpv6_setsockopt+0xa8/0xc0 [ 45.435055][ T4625] sock_common_setsockopt+0xb0/0xcc [ 45.436488][ T4625] __sys_setsockopt+0x3a8/0x6b4 [ 45.437811][ T4625] __arm64_sys_setsockopt+0xb8/0xd4 [ 45.439290][ T4625] invoke_syscall+0x98/0x2b8 [ 45.440538][ T4625] el0_svc_common+0x138/0x258 [ 45.441816][ T4625] do_el0_svc+0x58/0x14c executing program [ 45.442938][ T4625] el0_svc+0x7c/0x1f0 [ 45.444036][ T4625] el0t_64_sync_handler+0x84/0xe4 [ 45.445449][ T4625] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 46.388541][ T4712] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 46.391219][ T4712] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4712, name: syz-executor168 [ 46.393844][ T4712] INFO: lockdep is turned off. [ 46.395145][ T4712] irq event stamp: 0 [ 46.396210][ T4712] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 46.398186][ T4712] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 46.400697][ T4712] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 46.403204][ T4712] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 46.405164][ T4712] Preemption disabled at: [ 46.405171][ T4712] [] cgroup_get_from_path+0x30/0x300 [ 46.408286][ T4712] CPU: 0 PID: 4712 Comm: syz-executor168 Tainted: G W 5.15.164-syzkaller #0 [ 46.411022][ T4712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 46.413799][ T4712] Call trace: [ 46.414696][ T4712] dump_backtrace+0x0/0x530 [ 46.415904][ T4712] show_stack+0x2c/0x3c [ 46.417026][ T4712] dump_stack_lvl+0x108/0x170 [ 46.418306][ T4712] dump_stack+0x1c/0x58 [ 46.419456][ T4712] ___might_sleep+0x380/0x4dc [ 46.420727][ T4712] __might_sleep+0x98/0xf0 [ 46.421942][ T4712] down_read+0x34/0x398 [ 46.423091][ T4712] kernfs_walk_and_get_ns+0x8c/0x310 [ 46.424604][ T4712] cgroup_get_from_path+0x64/0x300 [ 46.425969][ T4712] cgroup_mt_check_v1+0x18c/0x278 [ 46.427346][ T4712] xt_check_match+0x338/0x914 [ 46.428653][ T4712] translate_table+0x10cc/0x1ac8 [ 46.430011][ T4712] do_ip6t_set_ctl+0xb8c/0x1164 [ 46.431311][ T4712] nf_setsockopt+0x270/0x290 [ 46.432574][ T4712] ipv6_setsockopt+0x1f78/0x3d74 [ 46.433916][ T4712] udpv6_setsockopt+0xa8/0xc0 [ 46.435242][ T4712] sock_common_setsockopt+0xb0/0xcc [ 46.436633][ T4712] __sys_setsockopt+0x3a8/0x6b4 [ 46.437974][ T4712] __arm64_sys_setsockopt+0xb8/0xd4 [ 46.439394][ T4712] invoke_syscall+0x98/0x2b8 [ 46.440738][ T4712] el0_svc_common+0x138/0x258 [ 46.442054][ T4712] do_el0_svc+0x58/0x14c [ 46.443192][ T4712] el0_svc+0x7c/0x1f0 executing program [ 46.444361][ T4712] el0t_64_sync_handler+0x84/0xe4 [ 46.445759][ T4712] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 47.388993][ T4799] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 47.391598][ T4799] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4799, name: syz-executor168 [ 47.394289][ T4799] INFO: lockdep is turned off. [ 47.395565][ T4799] irq event stamp: 0 [ 47.396610][ T4799] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 47.398547][ T4799] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 47.401073][ T4799] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 47.403595][ T4799] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 47.405564][ T4799] Preemption disabled at: [ 47.405572][ T4799] [] cgroup_get_from_path+0x30/0x300 [ 47.408603][ T4799] CPU: 0 PID: 4799 Comm: syz-executor168 Tainted: G W 5.15.164-syzkaller #0 [ 47.411341][ T4799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 47.414180][ T4799] Call trace: [ 47.415111][ T4799] dump_backtrace+0x0/0x530 [ 47.416391][ T4799] show_stack+0x2c/0x3c [ 47.417492][ T4799] dump_stack_lvl+0x108/0x170 [ 47.418749][ T4799] dump_stack+0x1c/0x58 [ 47.419911][ T4799] ___might_sleep+0x380/0x4dc [ 47.421194][ T4799] __might_sleep+0x98/0xf0 [ 47.422441][ T4799] down_read+0x34/0x398 [ 47.423570][ T4799] kernfs_walk_and_get_ns+0x8c/0x310 [ 47.425119][ T4799] cgroup_get_from_path+0x64/0x300 [ 47.426597][ T4799] cgroup_mt_check_v1+0x18c/0x278 [ 47.427986][ T4799] xt_check_match+0x338/0x914 [ 47.429242][ T4799] translate_table+0x10cc/0x1ac8 [ 47.430609][ T4799] do_ip6t_set_ctl+0xb8c/0x1164 [ 47.431916][ T4799] nf_setsockopt+0x270/0x290 [ 47.433289][ T4799] ipv6_setsockopt+0x1f78/0x3d74 [ 47.434632][ T4799] udpv6_setsockopt+0xa8/0xc0 [ 47.435928][ T4799] sock_common_setsockopt+0xb0/0xcc [ 47.437373][ T4799] __sys_setsockopt+0x3a8/0x6b4 [ 47.438731][ T4799] __arm64_sys_setsockopt+0xb8/0xd4 [ 47.440228][ T4799] invoke_syscall+0x98/0x2b8 [ 47.441529][ T4799] el0_svc_common+0x138/0x258 [ 47.442873][ T4799] do_el0_svc+0x58/0x14c executing program [ 47.444040][ T4799] el0_svc+0x7c/0x1f0 [ 47.445282][ T4799] el0t_64_sync_handler+0x84/0xe4 [ 47.446679][ T4799] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program