Warning: Permanently added '10.128.0.130' (ED25519) to the list of known hosts. executing program [ 39.850780][ T4017] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 39.853539][ T4017] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4017, name: syz-executor134 [ 39.856229][ T4017] 1 lock held by syz-executor134/4017: [ 39.857709][ T4017] #0: ffff800014cb6ad8 (css_set_lock){....}-{2:2}, at: cgroup_get_from_path+0x30/0x300 [ 39.860412][ T4017] irq event stamp: 502 [ 39.861505][ T4017] hardirqs last enabled at (501): [] finish_lock_switch+0xbc/0x1e8 [ 39.864118][ T4017] hardirqs last disabled at (502): [] _raw_spin_lock_irq+0x38/0x13c [ 39.866729][ T4017] softirqs last enabled at (476): [] release_sock+0x1e4/0x270 [ 39.869187][ T4017] softirqs last disabled at (474): [] release_sock+0x3c/0x270 [ 39.871717][ T4017] Preemption disabled at: [ 39.871724][ T4017] [] cgroup_get_from_path+0x30/0x300 [ 39.874769][ T4017] CPU: 0 PID: 4017 Comm: syz-executor134 Not tainted 5.15.164-syzkaller #0 [ 39.877093][ T4017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 39.879855][ T4017] Call trace: [ 39.880748][ T4017] dump_backtrace+0x0/0x530 [ 39.881960][ T4017] show_stack+0x2c/0x3c [ 39.883103][ T4017] dump_stack_lvl+0x108/0x170 [ 39.884374][ T4017] dump_stack+0x1c/0x58 [ 39.885501][ T4017] ___might_sleep+0x380/0x4dc [ 39.886744][ T4017] __might_sleep+0x98/0xf0 [ 39.887948][ T4017] down_read+0x34/0x398 [ 39.889081][ T4017] kernfs_walk_and_get_ns+0x8c/0x310 [ 39.890520][ T4017] cgroup_get_from_path+0x64/0x300 [ 39.891911][ T4017] cgroup_mt_check_v1+0x18c/0x278 [ 39.893297][ T4017] xt_check_match+0x338/0x914 [ 39.894604][ T4017] translate_table+0x10a0/0x1a98 [ 39.895996][ T4017] do_ipt_set_ctl+0xb8c/0x1164 [ 39.897281][ T4017] nf_setsockopt+0x270/0x290 [ 39.898520][ T4017] ip_setsockopt+0x1d70/0x32cc [ 39.899818][ T4017] tcp_setsockopt+0x204/0x33ec [ 39.901099][ T4017] sock_common_setsockopt+0xb0/0xcc [ 39.902514][ T4017] __sys_setsockopt+0x3a8/0x6b4 [ 39.903846][ T4017] __arm64_sys_setsockopt+0xb8/0xd4 [ 39.905294][ T4017] invoke_syscall+0x98/0x2b8 [ 39.906544][ T4017] el0_svc_common+0x138/0x258 [ 39.907852][ T4017] do_el0_svc+0x58/0x14c [ 39.909001][ T4017] el0_svc+0x7c/0x1f0 [ 39.910104][ T4017] el0t_64_sync_handler+0x84/0xe4 [ 39.911447][ T4017] el0t_64_sync+0x1a0/0x1a4 [ 39.912668][ T4017] [ 39.913278][ T4017] ============================= [ 39.914585][ T4017] [ BUG: Invalid wait context ] [ 39.915893][ T4017] 5.15.164-syzkaller #0 Tainted: G W [ 39.917668][ T4017] ----------------------------- [ 39.918961][ T4017] syz-executor134/4017 is trying to lock: [ 39.920508][ T4017] ffff800014db7410 (kernfs_rwsem){++++}-{3:3}, at: kernfs_walk_and_get_ns+0x8c/0x310 [ 39.923095][ T4017] other info that might help us debug this: [ 39.924667][ T4017] context-{4:4} [ 39.925593][ T4017] 1 lock held by syz-executor134/4017: [ 39.927068][ T4017] #0: ffff800014cb6ad8 (css_set_lock){....}-{2:2}, at: cgroup_get_from_path+0x30/0x300 [ 39.929720][ T4017] stack backtrace: [ 39.930712][ T4017] CPU: 0 PID: 4017 Comm: syz-executor134 Tainted: G W 5.15.164-syzkaller #0 [ 39.933461][ T4017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 39.936184][ T4017] Call trace: [ 39.937046][ T4017] dump_backtrace+0x0/0x530 [ 39.938289][ T4017] show_stack+0x2c/0x3c [ 39.939420][ T4017] dump_stack_lvl+0x108/0x170 [ 39.940681][ T4017] dump_stack+0x1c/0x58 [ 39.941803][ T4017] __lock_acquire+0x1af0/0x7638 [ 39.943124][ T4017] lock_acquire+0x240/0x77c [ 39.944348][ T4017] down_read+0xc0/0x398 [ 39.945469][ T4017] kernfs_walk_and_get_ns+0x8c/0x310 [ 39.946901][ T4017] cgroup_get_from_path+0x64/0x300 [ 39.948286][ T4017] cgroup_mt_check_v1+0x18c/0x278 [ 39.949643][ T4017] xt_check_match+0x338/0x914 [ 39.950901][ T4017] translate_table+0x10a0/0x1a98 executing program [ 39.952301][ T4017] do_ipt_set_ctl+0xb8c/0x1164 [ 39.953604][ T4017] nf_setsockopt+0x270/0x290 [ 39.954852][ T4017] ip_setsockopt+0x1d70/0x32cc [ 39.956158][ T4017] tcp_setsockopt+0x204/0x33ec [ 39.957453][ T4017] sock_common_setsockopt+0xb0/0xcc [ 39.958848][ T4017] __sys_setsockopt+0x3a8/0x6b4 executing program [ 39.960178][ T4017] __arm64_sys_setsockopt+0xb8/0xd4 [ 39.961583][ T4017] invoke_syscall+0x98/0x2b8 [ 39.962845][ T4017] el0_svc_common+0x138/0x258 [ 39.964108][ T4017] do_el0_svc+0x58/0x14c [ 39.965244][ T4017] el0_svc+0x7c/0x1f0 [ 39.966327][ T4017] el0t_64_sync_handler+0x84/0xe4 [ 39.967705][ T4017] el0t_64_sync+0x1a0/0x1a4 [ 39.969350][ T4017] xt_cgroup: invalid path, errno=-2 [ 39.973222][ T4018] xt_cgroup: invalid path, errno=-2 executing program [ 39.983681][ T4019] xt_cgroup: invalid path, errno=-2 [ 39.994376][ T4020] xt_cgroup: invalid path, errno=-2 executing program [ 40.005174][ T4021] xt_cgroup: invalid path, errno=-2 executing program [ 40.016213][ T4022] xt_cgroup: invalid path, errno=-2 executing program [ 40.027103][ T4023] xt_cgroup: invalid path, errno=-2 executing program [ 40.037824][ T4024] xt_cgroup: invalid path, errno=-2 executing program [ 40.048624][ T4025] xt_cgroup: invalid path, errno=-2 executing program [ 40.059368][ T4026] xt_cgroup: invalid path, errno=-2 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 40.847837][ T4099] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 40.850433][ T4099] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4099, name: syz-executor134 [ 40.853073][ T4099] INFO: lockdep is turned off. [ 40.854376][ T4099] irq event stamp: 0 [ 40.855465][ T4099] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 40.857343][ T4099] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 40.859797][ T4099] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 40.862260][ T4099] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 40.864182][ T4099] Preemption disabled at: [ 40.864189][ T4099] [] cgroup_get_from_path+0x30/0x300 [ 40.867225][ T4099] CPU: 0 PID: 4099 Comm: syz-executor134 Tainted: G W 5.15.164-syzkaller #0 [ 40.869941][ T4099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 40.872675][ T4099] Call trace: [ 40.873563][ T4099] dump_backtrace+0x0/0x530 [ 40.874753][ T4099] show_stack+0x2c/0x3c [ 40.875838][ T4099] dump_stack_lvl+0x108/0x170 [ 40.877142][ T4099] dump_stack+0x1c/0x58 [ 40.878272][ T4099] ___might_sleep+0x380/0x4dc [ 40.879532][ T4099] __might_sleep+0x98/0xf0 [ 40.880713][ T4099] down_read+0x34/0x398 [ 40.881845][ T4099] kernfs_walk_and_get_ns+0x8c/0x310 [ 40.883289][ T4099] cgroup_get_from_path+0x64/0x300 [ 40.884715][ T4099] cgroup_mt_check_v1+0x18c/0x278 [ 40.886282][ T4099] xt_check_match+0x338/0x914 [ 40.887497][ T4099] translate_table+0x10a0/0x1a98 [ 40.888904][ T4099] do_ipt_set_ctl+0xb8c/0x1164 [ 40.890262][ T4099] nf_setsockopt+0x270/0x290 [ 40.891486][ T4099] ip_setsockopt+0x1d70/0x32cc [ 40.892814][ T4099] tcp_setsockopt+0x204/0x33ec [ 40.894163][ T4099] sock_common_setsockopt+0xb0/0xcc [ 40.895579][ T4099] __sys_setsockopt+0x3a8/0x6b4 [ 40.896845][ T4099] __arm64_sys_setsockopt+0xb8/0xd4 [ 40.898110][ T4099] invoke_syscall+0x98/0x2b8 [ 40.899427][ T4099] el0_svc_common+0x138/0x258 [ 40.900765][ T4099] do_el0_svc+0x58/0x14c [ 40.901771][ T4099] el0_svc+0x7c/0x1f0 [ 40.902797][ T4099] el0t_64_sync_handler+0x84/0xe4 [ 40.904188][ T4099] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 41.852297][ T4186] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 41.854679][ T4186] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4186, name: syz-executor134 [ 41.857253][ T4186] INFO: lockdep is turned off. [ 41.858501][ T4186] irq event stamp: 0 [ 41.859504][ T4186] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 41.861406][ T4186] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 41.863737][ T4186] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 41.865996][ T4186] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 41.867881][ T4186] Preemption disabled at: [ 41.867887][ T4186] [] cgroup_get_from_path+0x30/0x300 [ 41.870737][ T4186] CPU: 1 PID: 4186 Comm: syz-executor134 Tainted: G W 5.15.164-syzkaller #0 [ 41.873330][ T4186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 41.875884][ T4186] Call trace: [ 41.876684][ T4186] dump_backtrace+0x0/0x530 [ 41.877961][ T4186] show_stack+0x2c/0x3c [ 41.879027][ T4186] dump_stack_lvl+0x108/0x170 [ 41.880312][ T4186] dump_stack+0x1c/0x58 [ 41.881337][ T4186] ___might_sleep+0x380/0x4dc [ 41.882519][ T4186] __might_sleep+0x98/0xf0 [ 41.883623][ T4186] down_read+0x34/0x398 [ 41.884672][ T4186] kernfs_walk_and_get_ns+0x8c/0x310 [ 41.886079][ T4186] cgroup_get_from_path+0x64/0x300 [ 41.887364][ T4186] cgroup_mt_check_v1+0x18c/0x278 [ 41.888565][ T4186] xt_check_match+0x338/0x914 [ 41.889722][ T4186] translate_table+0x10a0/0x1a98 [ 41.890985][ T4186] do_ipt_set_ctl+0xb8c/0x1164 [ 41.892239][ T4186] nf_setsockopt+0x270/0x290 [ 41.893491][ T4186] ip_setsockopt+0x1d70/0x32cc [ 41.894666][ T4186] tcp_setsockopt+0x204/0x33ec [ 41.895932][ T4186] sock_common_setsockopt+0xb0/0xcc [ 41.897320][ T4186] __sys_setsockopt+0x3a8/0x6b4 [ 41.898581][ T4186] __arm64_sys_setsockopt+0xb8/0xd4 [ 41.899885][ T4186] invoke_syscall+0x98/0x2b8 [ 41.900989][ T4186] el0_svc_common+0x138/0x258 [ 41.902207][ T4186] do_el0_svc+0x58/0x14c [ 41.903298][ T4186] el0_svc+0x7c/0x1f0 [ 41.904326][ T4186] el0t_64_sync_handler+0x84/0xe4 [ 41.905676][ T4186] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 42.845588][ T4273] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 42.848256][ T4273] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4273, name: syz-executor134 [ 42.850860][ T4273] INFO: lockdep is turned off. [ 42.852149][ T4273] irq event stamp: 0 [ 42.853213][ T4273] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 42.855067][ T4273] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 42.857535][ T4273] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 42.860001][ T4273] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 42.861993][ T4273] Preemption disabled at: [ 42.862001][ T4273] [] cgroup_get_from_path+0x30/0x300 [ 42.865006][ T4273] CPU: 0 PID: 4273 Comm: syz-executor134 Tainted: G W 5.15.164-syzkaller #0 [ 42.867549][ T4273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 42.870210][ T4273] Call trace: [ 42.871025][ T4273] dump_backtrace+0x0/0x530 [ 42.872229][ T4273] show_stack+0x2c/0x3c [ 42.873208][ T4273] dump_stack_lvl+0x108/0x170 [ 42.874452][ T4273] dump_stack+0x1c/0x58 [ 42.875506][ T4273] ___might_sleep+0x380/0x4dc [ 42.876739][ T4273] __might_sleep+0x98/0xf0 [ 42.877870][ T4273] down_read+0x34/0x398 [ 42.878851][ T4273] kernfs_walk_and_get_ns+0x8c/0x310 [ 42.880244][ T4273] cgroup_get_from_path+0x64/0x300 [ 42.881604][ T4273] cgroup_mt_check_v1+0x18c/0x278 [ 42.882986][ T4273] xt_check_match+0x338/0x914 [ 42.884284][ T4273] translate_table+0x10a0/0x1a98 [ 42.885577][ T4273] do_ipt_set_ctl+0xb8c/0x1164 [ 42.886831][ T4273] nf_setsockopt+0x270/0x290 [ 42.888015][ T4273] ip_setsockopt+0x1d70/0x32cc [ 42.889239][ T4273] tcp_setsockopt+0x204/0x33ec [ 42.890478][ T4273] sock_common_setsockopt+0xb0/0xcc [ 42.891865][ T4273] __sys_setsockopt+0x3a8/0x6b4 [ 42.893016][ T4273] __arm64_sys_setsockopt+0xb8/0xd4 [ 42.894489][ T4273] invoke_syscall+0x98/0x2b8 [ 42.895656][ T4273] el0_svc_common+0x138/0x258 [ 42.896875][ T4273] do_el0_svc+0x58/0x14c [ 42.898014][ T4273] el0_svc+0x7c/0x1f0 [ 42.898967][ T4273] el0t_64_sync_handler+0x84/0xe4 [ 42.900330][ T4273] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 43.852211][ T4361] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 43.854819][ T4361] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4361, name: syz-executor134 [ 43.857449][ T4361] INFO: lockdep is turned off. [ 43.858727][ T4361] irq event stamp: 0 [ 43.859753][ T4361] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 43.861649][ T4361] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 43.864071][ T4361] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 43.866452][ T4361] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 43.868282][ T4361] Preemption disabled at: [ 43.868288][ T4361] [] cgroup_get_from_path+0x30/0x300 [ 43.871284][ T4361] CPU: 0 PID: 4361 Comm: syz-executor134 Tainted: G W 5.15.164-syzkaller #0 [ 43.873967][ T4361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 43.876552][ T4361] Call trace: [ 43.877409][ T4361] dump_backtrace+0x0/0x530 [ 43.878552][ T4361] show_stack+0x2c/0x3c [ 43.879615][ T4361] dump_stack_lvl+0x108/0x170 [ 43.880878][ T4361] dump_stack+0x1c/0x58 [ 43.881972][ T4361] ___might_sleep+0x380/0x4dc [ 43.883148][ T4361] __might_sleep+0x98/0xf0 [ 43.884355][ T4361] down_read+0x34/0x398 [ 43.885459][ T4361] kernfs_walk_and_get_ns+0x8c/0x310 [ 43.886911][ T4361] cgroup_get_from_path+0x64/0x300 [ 43.888229][ T4361] cgroup_mt_check_v1+0x18c/0x278 [ 43.889553][ T4361] xt_check_match+0x338/0x914 [ 43.890785][ T4361] translate_table+0x10a0/0x1a98 [ 43.892019][ T4361] do_ipt_set_ctl+0xb8c/0x1164 [ 43.893348][ T4361] nf_setsockopt+0x270/0x290 [ 43.894503][ T4361] ip_setsockopt+0x1d70/0x32cc [ 43.895751][ T4361] tcp_setsockopt+0x204/0x33ec [ 43.897073][ T4361] sock_common_setsockopt+0xb0/0xcc [ 43.898421][ T4361] __sys_setsockopt+0x3a8/0x6b4 [ 43.899664][ T4361] __arm64_sys_setsockopt+0xb8/0xd4 [ 43.901128][ T4361] invoke_syscall+0x98/0x2b8 [ 43.902344][ T4361] el0_svc_common+0x138/0x258 [ 43.903613][ T4361] do_el0_svc+0x58/0x14c [ 43.904745][ T4361] el0_svc+0x7c/0x1f0 [ 43.905781][ T4361] el0t_64_sync_handler+0x84/0xe4 [ 43.907085][ T4361] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 44.847659][ T4448] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 44.850350][ T4448] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4448, name: syz-executor134 [ 44.852967][ T4448] INFO: lockdep is turned off. [ 44.854215][ T4448] irq event stamp: 0 [ 44.855109][ T4448] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 44.856991][ T4448] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 44.859243][ T4448] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 44.861651][ T4448] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 44.863458][ T4448] Preemption disabled at: [ 44.863464][ T4448] [] cgroup_get_from_path+0x30/0x300 [ 44.866474][ T4448] CPU: 0 PID: 4448 Comm: syz-executor134 Tainted: G W 5.15.164-syzkaller #0 [ 44.869069][ T4448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 44.871671][ T4448] Call trace: [ 44.872538][ T4448] dump_backtrace+0x0/0x530 [ 44.873667][ T4448] show_stack+0x2c/0x3c [ 44.874721][ T4448] dump_stack_lvl+0x108/0x170 [ 44.875957][ T4448] dump_stack+0x1c/0x58 [ 44.877073][ T4448] ___might_sleep+0x380/0x4dc [ 44.878301][ T4448] __might_sleep+0x98/0xf0 [ 44.879423][ T4448] down_read+0x34/0x398 [ 44.880498][ T4448] kernfs_walk_and_get_ns+0x8c/0x310 [ 44.881919][ T4448] cgroup_get_from_path+0x64/0x300 [ 44.883272][ T4448] cgroup_mt_check_v1+0x18c/0x278 [ 44.884561][ T4448] xt_check_match+0x338/0x914 [ 44.885850][ T4448] translate_table+0x10a0/0x1a98 [ 44.887223][ T4448] do_ipt_set_ctl+0xb8c/0x1164 [ 44.888535][ T4448] nf_setsockopt+0x270/0x290 [ 44.889808][ T4448] ip_setsockopt+0x1d70/0x32cc [ 44.891076][ T4448] tcp_setsockopt+0x204/0x33ec [ 44.892336][ T4448] sock_common_setsockopt+0xb0/0xcc [ 44.893683][ T4448] __sys_setsockopt+0x3a8/0x6b4 [ 44.894899][ T4448] __arm64_sys_setsockopt+0xb8/0xd4 [ 44.896311][ T4448] invoke_syscall+0x98/0x2b8 [ 44.897425][ T4448] el0_svc_common+0x138/0x258 [ 44.898626][ T4448] do_el0_svc+0x58/0x14c [ 44.899660][ T4448] el0_svc+0x7c/0x1f0 [ 44.900734][ T4448] el0t_64_sync_handler+0x84/0xe4 [ 44.901979][ T4448] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program [ 44.985162][ T4456] cgroup_mt_check_v1: 429 callbacks suppressed [ 44.985176][ T4456] xt_cgroup: invalid path, errno=-2 executing program [ 44.995837][ T4457] xt_cgroup: invalid path, errno=-2 executing program [ 45.006658][ T4458] xt_cgroup: invalid path, errno=-2 executing program [ 45.017376][ T4459] xt_cgroup: invalid path, errno=-2 executing program [ 45.028166][ T4460] xt_cgroup: invalid path, errno=-2 executing program [ 45.038903][ T4461] xt_cgroup: invalid path, errno=-2 executing program [ 45.049699][ T4462] xt_cgroup: invalid path, errno=-2 executing program [ 45.060499][ T4463] xt_cgroup: invalid path, errno=-2 executing program [ 45.071300][ T4464] xt_cgroup: invalid path, errno=-2 executing program [ 45.082095][ T4465] xt_cgroup: invalid path, errno=-2 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 45.852936][ T4536] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 45.855547][ T4536] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4536, name: syz-executor134 [ 45.858173][ T4536] INFO: lockdep is turned off. [ 45.859452][ T4536] irq event stamp: 0 [ 45.860511][ T4536] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 45.862546][ T4536] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 45.865084][ T4536] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 45.867528][ T4536] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 45.869522][ T4536] Preemption disabled at: [ 45.869529][ T4536] [] cgroup_get_from_path+0x30/0x300 [ 45.872623][ T4536] CPU: 0 PID: 4536 Comm: syz-executor134 Tainted: G W 5.15.164-syzkaller #0 [ 45.875390][ T4536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 45.878248][ T4536] Call trace: [ 45.879161][ T4536] dump_backtrace+0x0/0x530 [ 45.880372][ T4536] show_stack+0x2c/0x3c [ 45.881502][ T4536] dump_stack_lvl+0x108/0x170 [ 45.882833][ T4536] dump_stack+0x1c/0x58 [ 45.884090][ T4536] ___might_sleep+0x380/0x4dc [ 45.885415][ T4536] __might_sleep+0x98/0xf0 [ 45.886527][ T4536] down_read+0x34/0x398 [ 45.887720][ T4536] kernfs_walk_and_get_ns+0x8c/0x310 [ 45.889141][ T4536] cgroup_get_from_path+0x64/0x300 [ 45.890497][ T4536] cgroup_mt_check_v1+0x18c/0x278 [ 45.891916][ T4536] xt_check_match+0x338/0x914 [ 45.893206][ T4536] translate_table+0x10a0/0x1a98 [ 45.894569][ T4536] do_ipt_set_ctl+0xb8c/0x1164 [ 45.895885][ T4536] nf_setsockopt+0x270/0x290 [ 45.897024][ T4536] ip_setsockopt+0x1d70/0x32cc [ 45.898315][ T4536] tcp_setsockopt+0x204/0x33ec [ 45.899608][ T4536] sock_common_setsockopt+0xb0/0xcc [ 45.900987][ T4536] __sys_setsockopt+0x3a8/0x6b4 [ 45.902341][ T4536] __arm64_sys_setsockopt+0xb8/0xd4 [ 45.903793][ T4536] invoke_syscall+0x98/0x2b8 [ 45.905033][ T4536] el0_svc_common+0x138/0x258 [ 45.906318][ T4536] do_el0_svc+0x58/0x14c [ 45.907388][ T4536] el0_svc+0x7c/0x1f0 [ 45.908420][ T4536] el0t_64_sync_handler+0x84/0xe4 [ 45.909737][ T4536] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 46.846013][ T4623] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 46.848714][ T4623] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4623, name: syz-executor134 [ 46.851298][ T4623] INFO: lockdep is turned off. [ 46.852567][ T4623] irq event stamp: 0 [ 46.853601][ T4623] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 46.855519][ T4623] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 46.858011][ T4623] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 46.860473][ T4623] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 46.862330][ T4623] Preemption disabled at: [ 46.862337][ T4623] [] cgroup_get_from_path+0x30/0x300 [ 46.865238][ T4623] CPU: 0 PID: 4623 Comm: syz-executor134 Tainted: G W 5.15.164-syzkaller #0 [ 46.867966][ T4623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 46.870705][ T4623] Call trace: [ 46.871545][ T4623] dump_backtrace+0x0/0x530 [ 46.872782][ T4623] show_stack+0x2c/0x3c [ 46.873859][ T4623] dump_stack_lvl+0x108/0x170 [ 46.875136][ T4623] dump_stack+0x1c/0x58 [ 46.876247][ T4623] ___might_sleep+0x380/0x4dc [ 46.877500][ T4623] __might_sleep+0x98/0xf0 [ 46.878763][ T4623] down_read+0x34/0x398 [ 46.879828][ T4623] kernfs_walk_and_get_ns+0x8c/0x310 [ 46.881228][ T4623] cgroup_get_from_path+0x64/0x300 [ 46.882590][ T4623] cgroup_mt_check_v1+0x18c/0x278 [ 46.883907][ T4623] xt_check_match+0x338/0x914 [ 46.885093][ T4623] translate_table+0x10a0/0x1a98 [ 46.886407][ T4623] do_ipt_set_ctl+0xb8c/0x1164 [ 46.887566][ T4623] nf_setsockopt+0x270/0x290 [ 46.888757][ T4623] ip_setsockopt+0x1d70/0x32cc [ 46.889945][ T4623] tcp_setsockopt+0x204/0x33ec [ 46.891218][ T4623] sock_common_setsockopt+0xb0/0xcc [ 46.892656][ T4623] __sys_setsockopt+0x3a8/0x6b4 [ 46.893909][ T4623] __arm64_sys_setsockopt+0xb8/0xd4 [ 46.895332][ T4623] invoke_syscall+0x98/0x2b8 [ 46.896486][ T4623] el0_svc_common+0x138/0x258 [ 46.897636][ T4623] do_el0_svc+0x58/0x14c [ 46.898833][ T4623] el0_svc+0x7c/0x1f0 [ 46.899891][ T4623] el0t_64_sync_handler+0x84/0xe4 [ 46.901172][ T4623] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 47.851849][ T4711] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 47.854498][ T4711] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4711, name: syz-executor134 [ 47.857232][ T4711] INFO: lockdep is turned off. [ 47.858569][ T4711] irq event stamp: 0 [ 47.859636][ T4711] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 47.861641][ T4711] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 47.864253][ T4711] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 47.866870][ T4711] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 47.868730][ T4711] Preemption disabled at: [ 47.868736][ T4711] [] cgroup_get_from_path+0x30/0x300 [ 47.871735][ T4711] CPU: 0 PID: 4711 Comm: syz-executor134 Tainted: G W 5.15.164-syzkaller #0 [ 47.874395][ T4711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 47.877126][ T4711] Call trace: [ 47.878042][ T4711] dump_backtrace+0x0/0x530 [ 47.879289][ T4711] show_stack+0x2c/0x3c [ 47.880351][ T4711] dump_stack_lvl+0x108/0x170 [ 47.881645][ T4711] dump_stack+0x1c/0x58 [ 47.882695][ T4711] ___might_sleep+0x380/0x4dc [ 47.884080][ T4711] __might_sleep+0x98/0xf0 [ 47.885167][ T4711] down_read+0x34/0x398 [ 47.886202][ T4711] kernfs_walk_and_get_ns+0x8c/0x310 [ 47.887706][ T4711] cgroup_get_from_path+0x64/0x300 [ 47.889073][ T4711] cgroup_mt_check_v1+0x18c/0x278 [ 47.890357][ T4711] xt_check_match+0x338/0x914 [ 47.891619][ T4711] translate_table+0x10a0/0x1a98 [ 47.892886][ T4711] do_ipt_set_ctl+0xb8c/0x1164 [ 47.894125][ T4711] nf_setsockopt+0x270/0x290 [ 47.895393][ T4711] ip_setsockopt+0x1d70/0x32cc [ 47.896698][ T4711] tcp_setsockopt+0x204/0x33ec [ 47.897909][ T4711] sock_common_setsockopt+0xb0/0xcc [ 47.899205][ T4711] __sys_setsockopt+0x3a8/0x6b4 [ 47.900575][ T4711] __arm64_sys_setsockopt+0xb8/0xd4 [ 47.902222][ T4711] invoke_syscall+0x98/0x2b8 [ 47.903577][ T4711] el0_svc_common+0x138/0x258 [ 47.904918][ T4711] do_el0_svc+0x58/0x14c [ 47.906113][ T4711] el0_svc+0x7c/0x1f0 [ 47.907217][ T4711] el0t_64_sync_handler+0x84/0xe4 [ 47.908515][ T4711] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 48.856192][ T4799] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 48.858685][ T4799] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4799, name: syz-executor134 [ 48.861147][ T4799] INFO: lockdep is turned off. [ 48.862303][ T4799] irq event stamp: 0 [ 48.863231][ T4799] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 48.865024][ T4799] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 48.867258][ T4799] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 48.869535][ T4799] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 48.871470][ T4799] Preemption disabled at: [ 48.871476][ T4799] [] cgroup_get_from_path+0x30/0x300 [ 48.874329][ T4799] CPU: 1 PID: 4799 Comm: syz-executor134 Tainted: G W 5.15.164-syzkaller #0 [ 48.876899][ T4799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 48.879679][ T4799] Call trace: [ 48.880479][ T4799] dump_backtrace+0x0/0x530 [ 48.881695][ T4799] show_stack+0x2c/0x3c [ 48.882694][ T4799] dump_stack_lvl+0x108/0x170 [ 48.883903][ T4799] dump_stack+0x1c/0x58 [ 48.884987][ T4799] ___might_sleep+0x380/0x4dc [ 48.886276][ T4799] __might_sleep+0x98/0xf0 [ 48.887325][ T4799] down_read+0x34/0x398 [ 48.888463][ T4799] kernfs_walk_and_get_ns+0x8c/0x310 [ 48.889795][ T4799] cgroup_get_from_path+0x64/0x300 [ 48.890996][ T4799] cgroup_mt_check_v1+0x18c/0x278 [ 48.892377][ T4799] xt_check_match+0x338/0x914 [ 48.893634][ T4799] translate_table+0x10a0/0x1a98 [ 48.894785][ T4799] do_ipt_set_ctl+0xb8c/0x1164 [ 48.895883][ T4799] nf_setsockopt+0x270/0x290 [ 48.897046][ T4799] ip_setsockopt+0x1d70/0x32cc [ 48.898252][ T4799] tcp_setsockopt+0x204/0x33ec [ 48.899435][ T4799] sock_common_setsockopt+0xb0/0xcc [ 48.900771][ T4799] __sys_setsockopt+0x3a8/0x6b4 [ 48.902030][ T4799] __arm64_sys_setsockopt+0xb8/0xd4 [ 48.903386][ T4799] invoke_syscall+0x98/0x2b8 [ 48.904519][ T4799] el0_svc_common+0x138/0x258 [ 48.905578][ T4799] do_el0_svc+0x58/0x14c [ 48.906635][ T4799] el0_svc+0x7c/0x1f0 [ 48.907631][ T4799] el0t_64_sync_handler+0x84/0xe4 [ 48.908837][ T4799] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 49.858731][ T4887] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497