Warning: Permanently added '10.128.1.182' (ED25519) to the list of known hosts. executing program syzkaller login: [ 40.151527][ T4024] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 40.154077][ T4024] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4024, name: syz-executor269 [ 40.156578][ T4024] 1 lock held by syz-executor269/4024: [ 40.158028][ T4024] #0: ffff800014cb6ad8 (css_set_lock){....}-{2:2}, at: cgroup_get_from_path+0x30/0x300 [ 40.160613][ T4024] irq event stamp: 990 [ 40.161674][ T4024] hardirqs last enabled at (989): [] finish_lock_switch+0xbc/0x1e8 [ 40.164191][ T4024] hardirqs last disabled at (990): [] _raw_spin_lock_irq+0x38/0x13c [ 40.166699][ T4024] softirqs last enabled at (960): [] release_sock+0x1e4/0x270 [ 40.169076][ T4024] softirqs last disabled at (958): [] release_sock+0x3c/0x270 [ 40.171423][ T4024] Preemption disabled at: [ 40.171431][ T4024] [] cgroup_get_from_path+0x30/0x300 [ 40.174433][ T4024] CPU: 1 PID: 4024 Comm: syz-executor269 Not tainted 5.15.164-syzkaller #0 [ 40.176647][ T4024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 40.179292][ T4024] Call trace: [ 40.180146][ T4024] dump_backtrace+0x0/0x530 [ 40.181336][ T4024] show_stack+0x2c/0x3c [ 40.182432][ T4024] dump_stack_lvl+0x108/0x170 [ 40.183705][ T4024] dump_stack+0x1c/0x58 [ 40.184754][ T4024] ___might_sleep+0x380/0x4dc [ 40.185932][ T4024] __might_sleep+0x98/0xf0 [ 40.187044][ T4024] down_read+0x34/0x398 [ 40.188118][ T4024] kernfs_walk_and_get_ns+0x8c/0x310 [ 40.189470][ T4024] cgroup_get_from_path+0x64/0x300 [ 40.190800][ T4024] cgroup_mt_check_v1+0x18c/0x278 [ 40.192105][ T4024] xt_check_match+0x338/0x914 [ 40.193306][ T4024] translate_table+0x10cc/0x1ac8 [ 40.194606][ T4024] do_ip6t_set_ctl+0xb8c/0x1164 [ 40.195866][ T4024] nf_setsockopt+0x270/0x290 [ 40.197058][ T4024] ipv6_setsockopt+0x1f78/0x3d74 [ 40.198330][ T4024] udpv6_setsockopt+0xa8/0xc0 [ 40.199583][ T4024] sock_common_setsockopt+0xb0/0xcc [ 40.200963][ T4024] __sys_setsockopt+0x3a8/0x6b4 [ 40.202243][ T4024] __arm64_sys_setsockopt+0xb8/0xd4 [ 40.203623][ T4024] invoke_syscall+0x98/0x2b8 [ 40.204823][ T4024] el0_svc_common+0x138/0x258 [ 40.206106][ T4024] do_el0_svc+0x58/0x14c [ 40.207213][ T4024] el0_svc+0x7c/0x1f0 [ 40.208221][ T4024] el0t_64_sync_handler+0x84/0xe4 [ 40.209565][ T4024] el0t_64_sync+0x1a0/0x1a4 [ 40.210731][ T4024] [ 40.211399][ T4024] ============================= [ 40.212700][ T4024] [ BUG: Invalid wait context ] [ 40.213938][ T4024] 5.15.164-syzkaller #0 Tainted: G W [ 40.215672][ T4024] ----------------------------- [ 40.216956][ T4024] syz-executor269/4024 is trying to lock: [ 40.218493][ T4024] ffff800014db7410 (kernfs_rwsem){++++}-{3:3}, at: kernfs_walk_and_get_ns+0x8c/0x310 [ 40.220993][ T4024] other info that might help us debug this: [ 40.222567][ T4024] context-{4:4} [ 40.223481][ T4024] 1 lock held by syz-executor269/4024: [ 40.224922][ T4024] #0: ffff800014cb6ad8 (css_set_lock){....}-{2:2}, at: cgroup_get_from_path+0x30/0x300 [ 40.227562][ T4024] stack backtrace: [ 40.228538][ T4024] CPU: 1 PID: 4024 Comm: syz-executor269 Tainted: G W 5.15.164-syzkaller #0 [ 40.231191][ T4024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 40.233843][ T4024] Call trace: [ 40.234653][ T4024] dump_backtrace+0x0/0x530 [ 40.235793][ T4024] show_stack+0x2c/0x3c [ 40.236949][ T4024] dump_stack_lvl+0x108/0x170 [ 40.238172][ T4024] dump_stack+0x1c/0x58 [ 40.239293][ T4024] __lock_acquire+0x1af0/0x7638 [ 40.240603][ T4024] lock_acquire+0x240/0x77c [ 40.241841][ T4024] down_read+0xc0/0x398 [ 40.242963][ T4024] kernfs_walk_and_get_ns+0x8c/0x310 [ 40.244352][ T4024] cgroup_get_from_path+0x64/0x300 [ 40.245783][ T4024] cgroup_mt_check_v1+0x18c/0x278 [ 40.247229][ T4024] xt_check_match+0x338/0x914 [ 40.248544][ T4024] translate_table+0x10cc/0x1ac8 [ 40.249965][ T4024] do_ip6t_set_ctl+0xb8c/0x1164 [ 40.251241][ T4024] nf_setsockopt+0x270/0x290 [ 40.252562][ T4024] ipv6_setsockopt+0x1f78/0x3d74 [ 40.253893][ T4024] udpv6_setsockopt+0xa8/0xc0 [ 40.255153][ T4024] sock_common_setsockopt+0xb0/0xcc [ 40.256554][ T4024] __sys_setsockopt+0x3a8/0x6b4 [ 40.257866][ T4024] __arm64_sys_setsockopt+0xb8/0xd4 [ 40.259310][ T4024] invoke_syscall+0x98/0x2b8 [ 40.260479][ T4024] el0_svc_common+0x138/0x258 [ 40.261663][ T4024] do_el0_svc+0x58/0x14c [ 40.262756][ T4024] el0_svc+0x7c/0x1f0 [ 40.263832][ T4024] el0t_64_sync_handler+0x84/0xe4 executing program [ 40.265174][ T4024] el0t_64_sync+0x1a0/0x1a4 [ 40.266605][ T4024] xt_cgroup: invalid path, errno=-2 [ 40.271113][ T4025] xt_cgroup: invalid path, errno=-2 executing program [ 40.281878][ T4026] xt_cgroup: invalid path, errno=-2 executing program [ 40.292689][ T4027] xt_cgroup: invalid path, errno=-2 executing program executing program [ 40.303508][ T4028] xt_cgroup: invalid path, errno=-2 [ 40.314409][ T4029] xt_cgroup: invalid path, errno=-2 executing program [ 40.325207][ T4030] xt_cgroup: invalid path, errno=-2 executing program [ 40.336274][ T4031] xt_cgroup: invalid path, errno=-2 executing program [ 40.346875][ T4032] xt_cgroup: invalid path, errno=-2 executing program [ 40.357955][ T4033] xt_cgroup: invalid path, errno=-2 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 41.149929][ T4106] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 41.152525][ T4106] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4106, name: syz-executor269 [ 41.155066][ T4106] INFO: lockdep is turned off. [ 41.156371][ T4106] irq event stamp: 0 [ 41.157423][ T4106] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 41.159303][ T4106] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 41.161923][ T4106] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 41.164543][ T4106] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 41.166481][ T4106] Preemption disabled at: [ 41.166488][ T4106] [] cgroup_get_from_path+0x30/0x300 [ 41.169590][ T4106] CPU: 0 PID: 4106 Comm: syz-executor269 Tainted: G W 5.15.164-syzkaller #0 [ 41.172424][ T4106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 41.175263][ T4106] Call trace: [ 41.176142][ T4106] dump_backtrace+0x0/0x530 [ 41.177366][ T4106] show_stack+0x2c/0x3c [ 41.178475][ T4106] dump_stack_lvl+0x108/0x170 [ 41.179712][ T4106] dump_stack+0x1c/0x58 [ 41.180817][ T4106] ___might_sleep+0x380/0x4dc [ 41.182135][ T4106] __might_sleep+0x98/0xf0 [ 41.183321][ T4106] down_read+0x34/0x398 [ 41.184480][ T4106] kernfs_walk_and_get_ns+0x8c/0x310 [ 41.185993][ T4106] cgroup_get_from_path+0x64/0x300 [ 41.187362][ T4106] cgroup_mt_check_v1+0x18c/0x278 [ 41.188745][ T4106] xt_check_match+0x338/0x914 [ 41.190022][ T4106] translate_table+0x10cc/0x1ac8 [ 41.191328][ T4106] do_ip6t_set_ctl+0xb8c/0x1164 [ 41.192709][ T4106] nf_setsockopt+0x270/0x290 [ 41.193981][ T4106] ipv6_setsockopt+0x1f78/0x3d74 [ 41.195315][ T4106] udpv6_setsockopt+0xa8/0xc0 [ 41.196600][ T4106] sock_common_setsockopt+0xb0/0xcc [ 41.198013][ T4106] __sys_setsockopt+0x3a8/0x6b4 [ 41.199291][ T4106] __arm64_sys_setsockopt+0xb8/0xd4 executing program [ 41.200696][ T4106] invoke_syscall+0x98/0x2b8 [ 41.201982][ T4106] el0_svc_common+0x138/0x258 [ 41.203283][ T4106] do_el0_svc+0x58/0x14c [ 41.204441][ T4106] el0_svc+0x7c/0x1f0 [ 41.205552][ T4106] el0t_64_sync_handler+0x84/0xe4 [ 41.206903][ T4106] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 42.149103][ T4193] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 42.151754][ T4193] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4193, name: syz-executor269 [ 42.154352][ T4193] INFO: lockdep is turned off. [ 42.155624][ T4193] irq event stamp: 0 [ 42.156626][ T4193] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 42.158578][ T4193] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 42.161194][ T4193] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 42.163782][ T4193] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 42.165763][ T4193] Preemption disabled at: [ 42.165771][ T4193] [] cgroup_get_from_path+0x30/0x300 [ 42.168795][ T4193] CPU: 0 PID: 4193 Comm: syz-executor269 Tainted: G W 5.15.164-syzkaller #0 [ 42.171606][ T4193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 42.174539][ T4193] Call trace: [ 42.175434][ T4193] dump_backtrace+0x0/0x530 [ 42.176681][ T4193] show_stack+0x2c/0x3c [ 42.177880][ T4193] dump_stack_lvl+0x108/0x170 [ 42.179273][ T4193] dump_stack+0x1c/0x58 [ 42.180476][ T4193] ___might_sleep+0x380/0x4dc [ 42.181750][ T4193] __might_sleep+0x98/0xf0 [ 42.183010][ T4193] down_read+0x34/0x398 [ 42.184172][ T4193] kernfs_walk_and_get_ns+0x8c/0x310 [ 42.185624][ T4193] cgroup_get_from_path+0x64/0x300 [ 42.187110][ T4193] cgroup_mt_check_v1+0x18c/0x278 [ 42.188529][ T4193] xt_check_match+0x338/0x914 [ 42.189879][ T4193] translate_table+0x10cc/0x1ac8 [ 42.191297][ T4193] do_ip6t_set_ctl+0xb8c/0x1164 [ 42.192678][ T4193] nf_setsockopt+0x270/0x290 [ 42.193971][ T4193] ipv6_setsockopt+0x1f78/0x3d74 [ 42.195343][ T4193] udpv6_setsockopt+0xa8/0xc0 [ 42.196643][ T4193] sock_common_setsockopt+0xb0/0xcc [ 42.198047][ T4193] __sys_setsockopt+0x3a8/0x6b4 [ 42.199403][ T4193] __arm64_sys_setsockopt+0xb8/0xd4 [ 42.200874][ T4193] invoke_syscall+0x98/0x2b8 [ 42.202146][ T4193] el0_svc_common+0x138/0x258 [ 42.203528][ T4193] do_el0_svc+0x58/0x14c [ 42.204694][ T4193] el0_svc+0x7c/0x1f0 executing program [ 42.205802][ T4193] el0t_64_sync_handler+0x84/0xe4 [ 42.207277][ T4193] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 43.146388][ T4280] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 43.148918][ T4280] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4280, name: syz-executor269 [ 43.151330][ T4280] INFO: lockdep is turned off. [ 43.152552][ T4280] irq event stamp: 0 [ 43.153554][ T4280] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 43.155445][ T4280] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 43.157875][ T4280] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 43.160435][ T4280] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 43.162269][ T4280] Preemption disabled at: [ 43.162275][ T4280] [] cgroup_get_from_path+0x30/0x300 [ 43.165284][ T4280] CPU: 1 PID: 4280 Comm: syz-executor269 Tainted: G W 5.15.164-syzkaller #0 [ 43.167892][ T4280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 43.170572][ T4280] Call trace: [ 43.171436][ T4280] dump_backtrace+0x0/0x530 [ 43.172693][ T4280] show_stack+0x2c/0x3c [ 43.173797][ T4280] dump_stack_lvl+0x108/0x170 [ 43.175011][ T4280] dump_stack+0x1c/0x58 [ 43.176081][ T4280] ___might_sleep+0x380/0x4dc [ 43.177265][ T4280] __might_sleep+0x98/0xf0 [ 43.178448][ T4280] down_read+0x34/0x398 [ 43.179630][ T4280] kernfs_walk_and_get_ns+0x8c/0x310 [ 43.180979][ T4280] cgroup_get_from_path+0x64/0x300 [ 43.182373][ T4280] cgroup_mt_check_v1+0x18c/0x278 [ 43.183701][ T4280] xt_check_match+0x338/0x914 [ 43.184984][ T4280] translate_table+0x10cc/0x1ac8 [ 43.186295][ T4280] do_ip6t_set_ctl+0xb8c/0x1164 [ 43.187625][ T4280] nf_setsockopt+0x270/0x290 [ 43.188817][ T4280] ipv6_setsockopt+0x1f78/0x3d74 [ 43.190167][ T4280] udpv6_setsockopt+0xa8/0xc0 [ 43.191487][ T4280] sock_common_setsockopt+0xb0/0xcc [ 43.192935][ T4280] __sys_setsockopt+0x3a8/0x6b4 [ 43.194215][ T4280] __arm64_sys_setsockopt+0xb8/0xd4 [ 43.195746][ T4280] invoke_syscall+0x98/0x2b8 [ 43.196979][ T4280] el0_svc_common+0x138/0x258 [ 43.198189][ T4280] do_el0_svc+0x58/0x14c [ 43.199266][ T4280] el0_svc+0x7c/0x1f0 [ 43.200284][ T4280] el0t_64_sync_handler+0x84/0xe4 [ 43.201583][ T4280] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 44.154195][ T4368] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 44.156796][ T4368] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4368, name: syz-executor269 [ 44.159404][ T4368] INFO: lockdep is turned off. [ 44.160676][ T4368] irq event stamp: 0 [ 44.161733][ T4368] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 44.163624][ T4368] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 44.166213][ T4368] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 44.168767][ T4368] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 44.170685][ T4368] Preemption disabled at: [ 44.170691][ T4368] [] cgroup_get_from_path+0x30/0x300 [ 44.173693][ T4368] CPU: 0 PID: 4368 Comm: syz-executor269 Tainted: G W 5.15.164-syzkaller #0 [ 44.176615][ T4368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 44.179437][ T4368] Call trace: [ 44.180350][ T4368] dump_backtrace+0x0/0x530 [ 44.181621][ T4368] show_stack+0x2c/0x3c [ 44.182781][ T4368] dump_stack_lvl+0x108/0x170 [ 44.184052][ T4368] dump_stack+0x1c/0x58 [ 44.185250][ T4368] ___might_sleep+0x380/0x4dc [ 44.186505][ T4368] __might_sleep+0x98/0xf0 [ 44.187702][ T4368] down_read+0x34/0x398 [ 44.188833][ T4368] kernfs_walk_and_get_ns+0x8c/0x310 [ 44.190258][ T4368] cgroup_get_from_path+0x64/0x300 [ 44.191615][ T4368] cgroup_mt_check_v1+0x18c/0x278 [ 44.193026][ T4368] xt_check_match+0x338/0x914 [ 44.194331][ T4368] translate_table+0x10cc/0x1ac8 [ 44.195748][ T4368] do_ip6t_set_ctl+0xb8c/0x1164 [ 44.197037][ T4368] nf_setsockopt+0x270/0x290 [ 44.198284][ T4368] ipv6_setsockopt+0x1f78/0x3d74 [ 44.199626][ T4368] udpv6_setsockopt+0xa8/0xc0 [ 44.200941][ T4368] sock_common_setsockopt+0xb0/0xcc [ 44.202437][ T4368] __sys_setsockopt+0x3a8/0x6b4 [ 44.203732][ T4368] __arm64_sys_setsockopt+0xb8/0xd4 [ 44.205198][ T4368] invoke_syscall+0x98/0x2b8 [ 44.206407][ T4368] el0_svc_common+0x138/0x258 [ 44.207656][ T4368] do_el0_svc+0x58/0x14c [ 44.208794][ T4368] el0_svc+0x7c/0x1f0 [ 44.209966][ T4368] el0t_64_sync_handler+0x84/0xe4 [ 44.211422][ T4368] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 45.152390][ T4455] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 45.154833][ T4455] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4455, name: syz-executor269 [ 45.157331][ T4455] INFO: lockdep is turned off. [ 45.158527][ T4455] irq event stamp: 0 [ 45.159531][ T4455] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 45.161351][ T4455] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 45.163917][ T4455] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 45.166299][ T4455] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 45.168193][ T4455] Preemption disabled at: [ 45.168200][ T4455] [] cgroup_get_from_path+0x30/0x300 [ 45.171093][ T4455] CPU: 1 PID: 4455 Comm: syz-executor269 Tainted: G W 5.15.164-syzkaller #0 [ 45.173818][ T4455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 45.176417][ T4455] Call trace: [ 45.177254][ T4455] dump_backtrace+0x0/0x530 [ 45.178422][ T4455] show_stack+0x2c/0x3c [ 45.179500][ T4455] dump_stack_lvl+0x108/0x170 [ 45.180723][ T4455] dump_stack+0x1c/0x58 [ 45.181902][ T4455] ___might_sleep+0x380/0x4dc [ 45.183100][ T4455] __might_sleep+0x98/0xf0 [ 45.184312][ T4455] down_read+0x34/0x398 [ 45.185419][ T4455] kernfs_walk_and_get_ns+0x8c/0x310 [ 45.186752][ T4455] cgroup_get_from_path+0x64/0x300 [ 45.188069][ T4455] cgroup_mt_check_v1+0x18c/0x278 [ 45.189413][ T4455] xt_check_match+0x338/0x914 [ 45.190624][ T4455] translate_table+0x10cc/0x1ac8 [ 45.191996][ T4455] do_ip6t_set_ctl+0xb8c/0x1164 [ 45.193245][ T4455] nf_setsockopt+0x270/0x290 [ 45.194476][ T4455] ipv6_setsockopt+0x1f78/0x3d74 [ 45.195809][ T4455] udpv6_setsockopt+0xa8/0xc0 [ 45.197009][ T4455] sock_common_setsockopt+0xb0/0xcc [ 45.198292][ T4455] __sys_setsockopt+0x3a8/0x6b4 [ 45.199612][ T4455] __arm64_sys_setsockopt+0xb8/0xd4 [ 45.201005][ T4455] invoke_syscall+0x98/0x2b8 [ 45.202229][ T4455] el0_svc_common+0x138/0x258 [ 45.203565][ T4455] do_el0_svc+0x58/0x14c executing program [ 45.204699][ T4455] el0_svc+0x7c/0x1f0 [ 45.205761][ T4455] el0t_64_sync_handler+0x84/0xe4 [ 45.207110][ T4455] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program [ 45.279629][ T4462] cgroup_mt_check_v1: 428 callbacks suppressed [ 45.279643][ T4462] xt_cgroup: invalid path, errno=-2 executing program [ 45.290443][ T4463] xt_cgroup: invalid path, errno=-2 executing program [ 45.301257][ T4464] xt_cgroup: invalid path, errno=-2 executing program [ 45.312040][ T4465] xt_cgroup: invalid path, errno=-2 executing program [ 45.322988][ T4466] xt_cgroup: invalid path, errno=-2 executing program [ 45.333854][ T4467] xt_cgroup: invalid path, errno=-2 executing program [ 45.344668][ T4468] xt_cgroup: invalid path, errno=-2 executing program [ 45.356357][ T4469] xt_cgroup: invalid path, errno=-2 executing program [ 45.367507][ T4470] xt_cgroup: invalid path, errno=-2 executing program [ 45.378072][ T4471] xt_cgroup: invalid path, errno=-2 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 46.149600][ T4542] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 46.152240][ T4542] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4542, name: syz-executor269 [ 46.154812][ T4542] INFO: lockdep is turned off. [ 46.156074][ T4542] irq event stamp: 0 [ 46.157096][ T4542] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 46.159000][ T4542] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 46.161568][ T4542] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 46.164204][ T4542] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 46.166204][ T4542] Preemption disabled at: [ 46.166211][ T4542] [] cgroup_get_from_path+0x30/0x300 [ 46.169186][ T4542] CPU: 0 PID: 4542 Comm: syz-executor269 Tainted: G W 5.15.164-syzkaller #0 [ 46.172008][ T4542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 46.174802][ T4542] Call trace: [ 46.175727][ T4542] dump_backtrace+0x0/0x530 [ 46.176951][ T4542] show_stack+0x2c/0x3c [ 46.178048][ T4542] dump_stack_lvl+0x108/0x170 [ 46.179285][ T4542] dump_stack+0x1c/0x58 [ 46.180436][ T4542] ___might_sleep+0x380/0x4dc [ 46.181750][ T4542] __might_sleep+0x98/0xf0 [ 46.182946][ T4542] down_read+0x34/0x398 [ 46.184070][ T4542] kernfs_walk_and_get_ns+0x8c/0x310 [ 46.185509][ T4542] cgroup_get_from_path+0x64/0x300 [ 46.186888][ T4542] cgroup_mt_check_v1+0x18c/0x278 [ 46.188217][ T4542] xt_check_match+0x338/0x914 [ 46.189507][ T4542] translate_table+0x10cc/0x1ac8 [ 46.190890][ T4542] do_ip6t_set_ctl+0xb8c/0x1164 [ 46.192292][ T4542] nf_setsockopt+0x270/0x290 [ 46.193539][ T4542] ipv6_setsockopt+0x1f78/0x3d74 [ 46.194864][ T4542] udpv6_setsockopt+0xa8/0xc0 [ 46.196172][ T4542] sock_common_setsockopt+0xb0/0xcc [ 46.197840][ T4542] __sys_setsockopt+0x3a8/0x6b4 [ 46.199255][ T4542] __arm64_sys_setsockopt+0xb8/0xd4 [ 46.200675][ T4542] invoke_syscall+0x98/0x2b8 [ 46.201991][ T4542] el0_svc_common+0x138/0x258 [ 46.203305][ T4542] do_el0_svc+0x58/0x14c [ 46.204412][ T4542] el0_svc+0x7c/0x1f0 [ 46.205452][ T4542] el0t_64_sync_handler+0x84/0xe4 [ 46.206842][ T4542] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 47.149195][ T4629] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 47.151879][ T4629] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4629, name: syz-executor269 [ 47.154428][ T4629] INFO: lockdep is turned off. [ 47.155625][ T4629] irq event stamp: 0 [ 47.156660][ T4629] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 47.158536][ T4629] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 47.161172][ T4629] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 47.163902][ T4629] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 47.165872][ T4629] Preemption disabled at: [ 47.165879][ T4629] [] cgroup_get_from_path+0x30/0x300 [ 47.168943][ T4629] CPU: 0 PID: 4629 Comm: syz-executor269 Tainted: G W 5.15.164-syzkaller #0 [ 47.171685][ T4629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 47.174413][ T4629] Call trace: [ 47.175305][ T4629] dump_backtrace+0x0/0x530 [ 47.176498][ T4629] show_stack+0x2c/0x3c [ 47.177554][ T4629] dump_stack_lvl+0x108/0x170 [ 47.178826][ T4629] dump_stack+0x1c/0x58 [ 47.179962][ T4629] ___might_sleep+0x380/0x4dc [ 47.181256][ T4629] __might_sleep+0x98/0xf0 [ 47.182409][ T4629] down_read+0x34/0x398 [ 47.183591][ T4629] kernfs_walk_and_get_ns+0x8c/0x310 [ 47.185028][ T4629] cgroup_get_from_path+0x64/0x300 [ 47.186407][ T4629] cgroup_mt_check_v1+0x18c/0x278 [ 47.187845][ T4629] xt_check_match+0x338/0x914 [ 47.189240][ T4629] translate_table+0x10cc/0x1ac8 [ 47.190675][ T4629] do_ip6t_set_ctl+0xb8c/0x1164 [ 47.191987][ T4629] nf_setsockopt+0x270/0x290 [ 47.193302][ T4629] ipv6_setsockopt+0x1f78/0x3d74 [ 47.194682][ T4629] udpv6_setsockopt+0xa8/0xc0 [ 47.195986][ T4629] sock_common_setsockopt+0xb0/0xcc [ 47.197484][ T4629] __sys_setsockopt+0x3a8/0x6b4 [ 47.198832][ T4629] __arm64_sys_setsockopt+0xb8/0xd4 [ 47.200359][ T4629] invoke_syscall+0x98/0x2b8 [ 47.201612][ T4629] el0_svc_common+0x138/0x258 [ 47.202916][ T4629] do_el0_svc+0x58/0x14c [ 47.204150][ T4629] el0_svc+0x7c/0x1f0 [ 47.205239][ T4629] el0t_64_sync_handler+0x84/0xe4 [ 47.206663][ T4629] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 48.148339][ T4715] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 48.150851][ T4715] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4715, name: syz-executor269 [ 48.153326][ T4715] INFO: lockdep is turned off. [ 48.154502][ T4715] irq event stamp: 0 [ 48.155509][ T4715] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 48.157563][ T4715] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 48.160147][ T4715] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 48.162622][ T4715] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 48.164583][ T4715] Preemption disabled at: [ 48.164591][ T4715] [] cgroup_get_from_path+0x30/0x300 [ 48.167620][ T4715] CPU: 1 PID: 4715 Comm: syz-executor269 Tainted: G W 5.15.164-syzkaller #0 [ 48.170364][ T4715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 48.173277][ T4715] Call trace: [ 48.174174][ T4715] dump_backtrace+0x0/0x530 [ 48.175417][ T4715] show_stack+0x2c/0x3c [ 48.176532][ T4715] dump_stack_lvl+0x108/0x170 [ 48.177804][ T4715] dump_stack+0x1c/0x58 [ 48.178962][ T4715] ___might_sleep+0x380/0x4dc [ 48.180236][ T4715] __might_sleep+0x98/0xf0 [ 48.181385][ T4715] down_read+0x34/0x398 [ 48.182489][ T4715] kernfs_walk_and_get_ns+0x8c/0x310 [ 48.183979][ T4715] cgroup_get_from_path+0x64/0x300 [ 48.185418][ T4715] cgroup_mt_check_v1+0x18c/0x278 [ 48.186840][ T4715] xt_check_match+0x338/0x914 [ 48.188052][ T4715] translate_table+0x10cc/0x1ac8 [ 48.189362][ T4715] do_ip6t_set_ctl+0xb8c/0x1164 [ 48.190681][ T4715] nf_setsockopt+0x270/0x290 [ 48.191896][ T4715] ipv6_setsockopt+0x1f78/0x3d74 [ 48.193394][ T4715] udpv6_setsockopt+0xa8/0xc0 [ 48.194739][ T4715] sock_common_setsockopt+0xb0/0xcc executing program [ 48.196256][ T4715] __sys_setsockopt+0x3a8/0x6b4 [ 48.197535][ T4715] __arm64_sys_setsockopt+0xb8/0xd4 [ 48.198919][ T4715] invoke_syscall+0x98/0x2b8 [ 48.200167][ T4715] el0_svc_common+0x138/0x258 [ 48.201518][ T4715] do_el0_svc+0x58/0x14c [ 48.202778][ T4715] el0_svc+0x7c/0x1f0 [ 48.203871][ T4715] el0t_64_sync_handler+0x84/0xe4 [ 48.205356][ T4715] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 49.150059][ T4802] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 49.152716][ T4802] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4802, name: syz-executor269 [ 49.155265][ T4802] INFO: lockdep is turned off. [ 49.156531][ T4802] irq event stamp: 0 [ 49.157580][ T4802] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 49.159500][ T4802] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 49.162142][ T4802] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 49.164721][ T4802] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 49.166751][ T4802] Preemption disabled at: [ 49.166758][ T4802] [] cgroup_get_from_path+0x30/0x300 [ 49.169705][ T4802] CPU: 0 PID: 4802 Comm: syz-executor269 Tainted: G W 5.15.164-syzkaller #0 [ 49.172538][ T4802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 49.175376][ T4802] Call trace: [ 49.176299][ T4802] dump_backtrace+0x0/0x530 [ 49.177561][ T4802] show_stack+0x2c/0x3c [ 49.178729][ T4802] dump_stack_lvl+0x108/0x170 [ 49.179991][ T4802] dump_stack+0x1c/0x58 [ 49.181110][ T4802] ___might_sleep+0x380/0x4dc [ 49.182404][ T4802] __might_sleep+0x98/0xf0 [ 49.183681][ T4802] down_read+0x34/0x398 [ 49.184802][ T4802] kernfs_walk_and_get_ns+0x8c/0x310 [ 49.186248][ T4802] cgroup_get_from_path+0x64/0x300 [ 49.187667][ T4802] cgroup_mt_check_v1+0x18c/0x278 [ 49.189071][ T4802] xt_check_match+0x338/0x914 [ 49.190369][ T4802] translate_table+0x10cc/0x1ac8 [ 49.191712][ T4802] do_ip6t_set_ctl+0xb8c/0x1164 [ 49.192951][ T4802] nf_setsockopt+0x270/0x290 [ 49.194164][ T4802] ipv6_setsockopt+0x1f78/0x3d74 [ 49.195552][ T4802] udpv6_setsockopt+0xa8/0xc0 [ 49.196817][ T4802] sock_common_setsockopt+0xb0/0xcc [ 49.198255][ T4802] __sys_setsockopt+0x3a8/0x6b4 [ 49.199585][ T4802] __arm64_sys_setsockopt+0xb8/0xd4 [ 49.201029][ T4802] invoke_syscall+0x98/0x2b8 [ 49.202325][ T4802] el0_svc_common+0x138/0x258 [ 49.203614][ T4802] do_el0_svc+0x58/0x14c [ 49.204859][ T4802] el0_svc+0x7c/0x1f0 [ 49.205894][ T4802] el0t_64_sync_handler+0x84/0xe4 [ 49.207261][ T4802] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 50.146720][ T4889] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 50.149203][ T4889] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4889, name: syz-executor269 [ 50.151503][ T4889] INFO: lockdep is turned off. [ 50.152726][ T4889] irq event stamp: 0 [ 50.153662][ T4889] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 50.155460][ T4889] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 50.157939][ T4889] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 50.160436][ T4889] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 50.162375][ T4889] Preemption disabled at: [ 50.162381][ T4889] [] cgroup_get_from_path+0x30/0x300 [ 50.165354][ T4889] CPU: 1 PID: 4889 Comm: syz-executor269 Tainted: G W 5.15.164-syzkaller #0 [ 50.168025][ T4889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 50.170730][ T4889] Call trace: [ 50.171637][ T4889] dump_backtrace+0x0/0x530