BUG: sleeping function called from invalid context at block/blk-sysfs.c:766 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3602, name: syz-executor.0 preempt_count: 101, expected: 0 RCU nest depth: 0, expected: 0 INFO: lockdep is turned off. Preemption disabled at: [] unwind_next_frame+0x120/0x1ce0 arch/x86/kernel/unwind_orc.c:428 CPU: 0 PID: 3602 Comm: syz-executor.0 Tainted: G W 5.17.0-syzkaller-10748-g2975dbdc3989 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 __might_resched.cold+0x222/0x26b kernel/sched/core.c:9733 blk_release_queue+0x1f/0x320 block/blk-sysfs.c:766 kobject_cleanup lib/kobject.c:705 [inline] kobject_release lib/kobject.c:736 [inline] kref_put include/linux/kref.h:65 [inline] kobject_put+0x1c8/0x540 lib/kobject.c:753 blkg_free.part.0+0x112/0x1f0 block/blk-cgroup.c:86 blkg_free block/blk-cgroup.c:78 [inline] __blkg_release+0x105/0x160 block/blk-cgroup.c:102 rcu_do_batch kernel/rcu/tree.c:2535 [inline] rcu_core+0x7b1/0x1880 kernel/rcu/tree.c:2786 __do_softirq+0x29b/0x9c2 kernel/softirq.c:558 invoke_softirq kernel/softirq.c:432 [inline] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:637 irq_exit_rcu+0x5/0x20 kernel/softirq.c:649 sysvec_apic_timer_interrupt+0x93/0xc0 arch/x86/kernel/apic/apic.c:1097 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:645 RIP: 0010:orc_ip arch/x86/kernel/unwind_orc.c:30 [inline] RIP: 0010:__orc_find+0x83/0xf0 arch/x86/kernel/unwind_orc.c:52 Code: 01 d0 48 d1 f8 48 8d 5c 85 00 48 89 d8 48 c1 e8 03 42 0f b6 14 38 48 89 d8 83 e0 07 83 c0 03 38 d0 7c 04 84 d2 75 48 48 63 03 <48> 01 d8 48 39 c1 73 b0 4c 8d 63 fc 49 39 ec 73 b3 4d 29 ee 49 c1 RSP: 0018:ffffc9000401f578 EFLAGS: 00000246 RAX: fffffffff3eda8cc RBX: ffffffff8dcaa4f0 RCX: ffffffff81b84f32 RDX: 0000000000000000 RSI: ffffffff8e3d2f32 RDI: ffffffff8dcaa4f0 RBP: ffffffff8dcaa4f0 R08: ffffffff8e3d2f32 R09: 0000000000000001 R10: fffff52000803ede R11: 000000000008a079 R12: ffffffff8dcaa4f0 R13: ffffffff8dcaa4f0 R14: ffffffff8dcaa4f0 R15: dffffc0000000000 orc_find arch/x86/kernel/unwind_orc.c:173 [inline] unwind_next_frame+0x32a/0x1ce0 arch/x86/kernel/unwind_orc.c:443 arch_stack_walk+0x7d/0xe0 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x8c/0xc0 kernel/stacktrace.c:122 kasan_save_stack+0x1e/0x40 mm/kasan/common.c:38 kasan_set_track+0x21/0x30 mm/kasan/common.c:45 kasan_set_free_info+0x20/0x30 mm/kasan/generic.c:370 ____kasan_slab_free mm/kasan/common.c:366 [inline] ____kasan_slab_free+0x166/0x1a0 mm/kasan/common.c:328 kasan_slab_free include/linux/kasan.h:200 [inline] slab_free_hook mm/slub.c:1728 [inline] slab_free_freelist_hook+0x8b/0x1c0 mm/slub.c:1754 slab_free mm/slub.c:3510 [inline] kfree+0xd6/0x4d0 mm/slub.c:4552 kvfree+0x42/0x50 mm/util.c:615 __vunmap+0xb33/0xe10 mm/vmalloc.c:2680 __vfree+0x3c/0xd0 mm/vmalloc.c:2723 vfree+0x5a/0x90 mm/vmalloc.c:2754 copy_entries_to_user net/ipv4/netfilter/ip_tables.c:868 [inline] get_entries net/ipv4/netfilter/ip_tables.c:1024 [inline] do_ipt_get_ctl+0x787/0x950 net/ipv4/netfilter/ip_tables.c:1663 nf_getsockopt+0x72/0xd0 net/netfilter/nf_sockopt.c:116 ip_getsockopt net/ipv4/ip_sockglue.c:1786 [inline] ip_getsockopt+0x164/0x1c0 net/ipv4/ip_sockglue.c:1765 tcp_getsockopt+0x86/0xd0 net/ipv4/tcp.c:4295 __sys_getsockopt+0x1a7/0x590 net/socket.c:2224 __do_sys_getsockopt net/socket.c:2239 [inline] __se_sys_getsockopt net/socket.c:2236 [inline] __x64_sys_getsockopt+0xba/0x150 net/socket.c:2236 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0x80 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f806e88a66a Code: 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 37 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffecea86b98 EFLAGS: 00000216 ORIG_RAX: 0000000000000037 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f806e88a66a RDX: 0000000000000041 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 00007ffecea86bc0 R08: 00007ffecea86bbc R09: ff00000000000000 R10: 00007ffecea86c20 R11: 0000000000000216 R12: 00007ffecea86c20 R13: 0000000000000003 R14: 00007ffecea86bbc R15: 00007f806e96cd20 ---------------- Code disassembly (best guess): 0: 01 d0 add %edx,%eax 2: 48 d1 f8 sar %rax 5: 48 8d 5c 85 00 lea 0x0(%rbp,%rax,4),%rbx a: 48 89 d8 mov %rbx,%rax d: 48 c1 e8 03 shr $0x3,%rax 11: 42 0f b6 14 38 movzbl (%rax,%r15,1),%edx 16: 48 89 d8 mov %rbx,%rax 19: 83 e0 07 and $0x7,%eax 1c: 83 c0 03 add $0x3,%eax 1f: 38 d0 cmp %dl,%al 21: 7c 04 jl 0x27 23: 84 d2 test %dl,%dl 25: 75 48 jne 0x6f 27: 48 63 03 movslq (%rbx),%rax * 2a: 48 01 d8 add %rbx,%rax <-- trapping instruction 2d: 48 39 c1 cmp %rax,%rcx 30: 73 b0 jae 0xffffffe2 32: 4c 8d 63 fc lea -0x4(%rbx),%r12 36: 49 39 ec cmp %rbp,%r12 39: 73 b3 jae 0xffffffee 3b: 4d 29 ee sub %r13,%r14 3e: 49 rex.WB 3f: c1 .byte 0xc1