Warning: Permanently added '10.128.0.68' (ED25519) to the list of known hosts. executing program [ 45.194203][ T4019] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 45.197035][ T4019] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4019, name: syz-executor382 [ 45.199556][ T4019] 1 lock held by syz-executor382/4019: [ 45.201222][ T4019] #0: ffff800014d67718 (css_set_lock){....}-{2:2}, at: cgroup_get_from_path+0x30/0x300 [ 45.203839][ T4019] irq event stamp: 632 [ 45.204946][ T4019] hardirqs last enabled at (631): [] queue_delayed_work_on+0x238/0x330 [ 45.207651][ T4019] hardirqs last disabled at (632): [] _raw_spin_lock_irq+0x38/0x13c [ 45.210257][ T4019] softirqs last enabled at (532): [] handle_softirqs+0xb88/0xdbc [ 45.212910][ T4019] softirqs last disabled at (521): [] __irq_exit_rcu+0x268/0x4d8 [ 45.215424][ T4019] Preemption disabled at: [ 45.215431][ T4019] [] cgroup_get_from_path+0x30/0x300 [ 45.218471][ T4019] CPU: 1 PID: 4019 Comm: syz-executor382 Not tainted 5.15.177-syzkaller #0 [ 45.220956][ T4019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 45.223793][ T4019] Call trace: [ 45.224715][ T4019] dump_backtrace+0x0/0x530 [ 45.225823][ T4019] show_stack+0x2c/0x3c [ 45.226928][ T4019] dump_stack_lvl+0x108/0x170 [ 45.228217][ T4019] dump_stack+0x1c/0x58 [ 45.229368][ T4019] ___might_sleep+0x380/0x4dc [ 45.230810][ T4019] __might_sleep+0x98/0xf0 [ 45.231987][ T4019] down_read+0x34/0x398 [ 45.233106][ T4019] kernfs_walk_and_get_ns+0x8c/0x310 [ 45.234562][ T4019] cgroup_get_from_path+0x64/0x300 [ 45.235935][ T4019] cgroup_mt_check_v1+0x18c/0x278 [ 45.237364][ T4019] xt_check_match+0x338/0x914 [ 45.238588][ T4019] translate_table+0x10a0/0x1a98 [ 45.240006][ T4019] do_ipt_set_ctl+0xb8c/0x1164 [ 45.241237][ T4019] nf_setsockopt+0x270/0x290 [ 45.242516][ T4019] ip_setsockopt+0x1d70/0x32cc [ 45.243823][ T4019] udp_setsockopt+0xa4/0xbc [ 45.245056][ T4019] sock_common_setsockopt+0xb0/0xcc [ 45.246493][ T4019] __sys_setsockopt+0x3a8/0x6b4 [ 45.247922][ T4019] __arm64_sys_setsockopt+0xb8/0xd4 [ 45.249383][ T4019] invoke_syscall+0x98/0x2b8 [ 45.250637][ T4019] el0_svc_common+0x138/0x258 [ 45.251924][ T4019] do_el0_svc+0x58/0x14c [ 45.253017][ T4019] el0_svc+0x7c/0x1f0 [ 45.254123][ T4019] el0t_64_sync_handler+0x84/0xe4 [ 45.255546][ T4019] el0t_64_sync+0x1a0/0x1a4 [ 45.256808][ T4019] [ 45.257462][ T4019] ============================= [ 45.258755][ T4019] [ BUG: Invalid wait context ] [ 45.259998][ T4019] 5.15.177-syzkaller #0 Tainted: G W [ 45.261816][ T4019] ----------------------------- [ 45.263081][ T4019] syz-executor382/4019 is trying to lock: [ 45.264669][ T4019] ffff800014e682b0 (kernfs_rwsem){++++}-{3:3}, at: kernfs_walk_and_get_ns+0x8c/0x310 [ 45.267345][ T4019] other info that might help us debug this: [ 45.269117][ T4019] context-{4:4} [ 45.270134][ T4019] 1 lock held by syz-executor382/4019: [ 45.271576][ T4019] #0: ffff800014d67718 (css_set_lock){....}-{2:2}, at: cgroup_get_from_path+0x30/0x300 [ 45.274220][ T4019] stack backtrace: [ 45.275223][ T4019] CPU: 1 PID: 4019 Comm: syz-executor382 Tainted: G W 5.15.177-syzkaller #0 [ 45.277942][ T4019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 45.280748][ T4019] Call trace: [ 45.281623][ T4019] dump_backtrace+0x0/0x530 [ 45.282904][ T4019] show_stack+0x2c/0x3c [ 45.284099][ T4019] dump_stack_lvl+0x108/0x170 [ 45.285346][ T4019] dump_stack+0x1c/0x58 [ 45.286513][ T4019] __lock_acquire+0x1af0/0x7638 [ 45.287786][ T4019] lock_acquire+0x240/0x77c [ 45.289086][ T4019] down_read+0xc0/0x398 [ 45.290244][ T4019] kernfs_walk_and_get_ns+0x8c/0x310 [ 45.291652][ T4019] cgroup_get_from_path+0x64/0x300 [ 45.293075][ T4019] cgroup_mt_check_v1+0x18c/0x278 [ 45.294433][ T4019] xt_check_match+0x338/0x914 [ 45.295774][ T4019] translate_table+0x10a0/0x1a98 [ 45.297108][ T4019] do_ipt_set_ctl+0xb8c/0x1164 [ 45.298314][ T4019] nf_setsockopt+0x270/0x290 [ 45.299538][ T4019] ip_setsockopt+0x1d70/0x32cc [ 45.300755][ T4019] udp_setsockopt+0xa4/0xbc [ 45.301928][ T4019] sock_common_setsockopt+0xb0/0xcc [ 45.303477][ T4019] __sys_setsockopt+0x3a8/0x6b4 [ 45.304737][ T4019] __arm64_sys_setsockopt+0xb8/0xd4 [ 45.306165][ T4019] invoke_syscall+0x98/0x2b8 [ 45.307336][ T4019] el0_svc_common+0x138/0x258 [ 45.308651][ T4019] do_el0_svc+0x58/0x14c [ 45.309823][ T4019] el0_svc+0x7c/0x1f0 [ 45.311046][ T4019] el0t_64_sync_handler+0x84/0xe4 [ 45.312407][ T4019] el0t_64_sync+0x1a0/0x1a4 [ 45.313997][ T4019] xt_cgroup: invalid path, errno=-2 executing program [ 45.335502][ T4020] xt_cgroup: invalid path, errno=-2 executing program [ 45.366619][ T4021] xt_cgroup: invalid path, errno=-2 executing program [ 45.397687][ T4022] xt_cgroup: invalid path, errno=-2 executing program [ 45.428836][ T4023] xt_cgroup: invalid path, errno=-2 executing program [ 45.459863][ T4024] xt_cgroup: invalid path, errno=-2 executing program [ 45.491049][ T4025] xt_cgroup: invalid path, errno=-2 executing program [ 45.522260][ T4026] xt_cgroup: invalid path, errno=-2 executing program [ 45.553709][ T4027] xt_cgroup: invalid path, errno=-2 executing program [ 45.584709][ T4028] xt_cgroup: invalid path, errno=-2 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 46.204184][ T4057] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 46.206747][ T4057] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4057, name: syz-executor382 [ 46.209309][ T4057] INFO: lockdep is turned off. [ 46.210573][ T4057] irq event stamp: 0 [ 46.211635][ T4057] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 46.213552][ T4057] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 46.215975][ T4057] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 46.218514][ T4057] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 46.220449][ T4057] Preemption disabled at: [ 46.220456][ T4057] [] cgroup_get_from_path+0x30/0x300 [ 46.223435][ T4057] CPU: 1 PID: 4057 Comm: syz-executor382 Tainted: G W 5.15.177-syzkaller #0 [ 46.226160][ T4057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 46.228952][ T4057] Call trace: [ 46.229860][ T4057] dump_backtrace+0x0/0x530 [ 46.231021][ T4057] show_stack+0x2c/0x3c [ 46.232222][ T4057] dump_stack_lvl+0x108/0x170 [ 46.233531][ T4057] dump_stack+0x1c/0x58 [ 46.234689][ T4057] ___might_sleep+0x380/0x4dc [ 46.236133][ T4057] __might_sleep+0x98/0xf0 [ 46.237413][ T4057] down_read+0x34/0x398 [ 46.238429][ T4057] kernfs_walk_and_get_ns+0x8c/0x310 [ 46.239903][ T4057] cgroup_get_from_path+0x64/0x300 [ 46.241311][ T4057] cgroup_mt_check_v1+0x18c/0x278 [ 46.242738][ T4057] xt_check_match+0x338/0x914 [ 46.244025][ T4057] translate_table+0x10a0/0x1a98 [ 46.245417][ T4057] do_ipt_set_ctl+0xb8c/0x1164 [ 46.246724][ T4057] nf_setsockopt+0x270/0x290 [ 46.247951][ T4057] ip_setsockopt+0x1d70/0x32cc [ 46.249358][ T4057] udp_setsockopt+0xa4/0xbc [ 46.250596][ T4057] sock_common_setsockopt+0xb0/0xcc [ 46.252011][ T4057] __sys_setsockopt+0x3a8/0x6b4 [ 46.253445][ T4057] __arm64_sys_setsockopt+0xb8/0xd4 [ 46.254811][ T4057] invoke_syscall+0x98/0x2b8 [ 46.256083][ T4057] el0_svc_common+0x138/0x258 [ 46.257355][ T4057] do_el0_svc+0x58/0x14c [ 46.258564][ T4057] el0_svc+0x7c/0x1f0 [ 46.259785][ T4057] el0t_64_sync_handler+0x84/0xe4 [ 46.261168][ T4057] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 47.211560][ T4102] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 47.214181][ T4102] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4102, name: syz-executor382 [ 47.217059][ T4102] INFO: lockdep is turned off. [ 47.218452][ T4102] irq event stamp: 0 [ 47.219493][ T4102] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 47.221438][ T4102] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 47.223889][ T4102] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 47.226398][ T4102] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 47.228414][ T4102] Preemption disabled at: [ 47.228421][ T4102] [] cgroup_get_from_path+0x30/0x300 [ 47.231331][ T4102] CPU: 1 PID: 4102 Comm: syz-executor382 Tainted: G W 5.15.177-syzkaller #0 [ 47.233980][ T4102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 47.236617][ T4102] Call trace: [ 47.237547][ T4102] dump_backtrace+0x0/0x530 [ 47.238766][ T4102] show_stack+0x2c/0x3c [ 47.239882][ T4102] dump_stack_lvl+0x108/0x170 [ 47.241139][ T4102] dump_stack+0x1c/0x58 [ 47.242257][ T4102] ___might_sleep+0x380/0x4dc [ 47.243511][ T4102] __might_sleep+0x98/0xf0 [ 47.244765][ T4102] down_read+0x34/0x398 [ 47.245939][ T4102] kernfs_walk_and_get_ns+0x8c/0x310 [ 47.247320][ T4102] cgroup_get_from_path+0x64/0x300 [ 47.248733][ T4102] cgroup_mt_check_v1+0x18c/0x278 [ 47.250042][ T4102] xt_check_match+0x338/0x914 [ 47.251296][ T4102] translate_table+0x10a0/0x1a98 [ 47.252627][ T4102] do_ipt_set_ctl+0xb8c/0x1164 [ 47.253930][ T4102] nf_setsockopt+0x270/0x290 [ 47.255124][ T4102] ip_setsockopt+0x1d70/0x32cc [ 47.256478][ T4102] udp_setsockopt+0xa4/0xbc [ 47.257723][ T4102] sock_common_setsockopt+0xb0/0xcc [ 47.259177][ T4102] __sys_setsockopt+0x3a8/0x6b4 [ 47.260503][ T4102] __arm64_sys_setsockopt+0xb8/0xd4 [ 47.261902][ T4102] invoke_syscall+0x98/0x2b8 [ 47.263301][ T4102] el0_svc_common+0x138/0x258 [ 47.264583][ T4102] do_el0_svc+0x58/0x14c [ 47.265913][ T4102] el0_svc+0x7c/0x1f0 [ 47.266939][ T4102] el0t_64_sync_handler+0x84/0xe4 [ 47.268284][ T4102] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 48.220661][ T4147] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 48.223232][ T4147] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4147, name: syz-executor382 [ 48.225807][ T4147] INFO: lockdep is turned off. [ 48.227142][ T4147] irq event stamp: 0 [ 48.228175][ T4147] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 48.230123][ T4147] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 48.232680][ T4147] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 48.235330][ T4147] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 48.237242][ T4147] Preemption disabled at: [ 48.237249][ T4147] [] cgroup_get_from_path+0x30/0x300 [ 48.240365][ T4147] CPU: 1 PID: 4147 Comm: syz-executor382 Tainted: G W 5.15.177-syzkaller #0 [ 48.243333][ T4147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 48.246162][ T4147] Call trace: [ 48.247026][ T4147] dump_backtrace+0x0/0x530 [ 48.248212][ T4147] show_stack+0x2c/0x3c [ 48.249444][ T4147] dump_stack_lvl+0x108/0x170 [ 48.250885][ T4147] dump_stack+0x1c/0x58 [ 48.252100][ T4147] ___might_sleep+0x380/0x4dc [ 48.253469][ T4147] __might_sleep+0x98/0xf0 [ 48.254704][ T4147] down_read+0x34/0x398 [ 48.255886][ T4147] kernfs_walk_and_get_ns+0x8c/0x310 [ 48.257350][ T4147] cgroup_get_from_path+0x64/0x300 [ 48.258777][ T4147] cgroup_mt_check_v1+0x18c/0x278 [ 48.260130][ T4147] xt_check_match+0x338/0x914 [ 48.261547][ T4147] translate_table+0x10a0/0x1a98 [ 48.263009][ T4147] do_ipt_set_ctl+0xb8c/0x1164 [ 48.264427][ T4147] nf_setsockopt+0x270/0x290 [ 48.265580][ T4147] ip_setsockopt+0x1d70/0x32cc [ 48.266864][ T4147] udp_setsockopt+0xa4/0xbc [ 48.268054][ T4147] sock_common_setsockopt+0xb0/0xcc [ 48.269660][ T4147] __sys_setsockopt+0x3a8/0x6b4 [ 48.271022][ T4147] __arm64_sys_setsockopt+0xb8/0xd4 [ 48.272518][ T4147] invoke_syscall+0x98/0x2b8 [ 48.273788][ T4147] el0_svc_common+0x138/0x258 [ 48.275113][ T4147] do_el0_svc+0x58/0x14c [ 48.276275][ T4147] el0_svc+0x7c/0x1f0 [ 48.277300][ T4147] el0t_64_sync_handler+0x84/0xe4 [ 48.278664][ T4147] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 49.231398][ T4192] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 49.234110][ T4192] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4192, name: syz-executor382 [ 49.236839][ T4192] INFO: lockdep is turned off. [ 49.238184][ T4192] irq event stamp: 0 [ 49.239291][ T4192] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 49.241325][ T4192] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 49.243890][ T4192] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 49.246452][ T4192] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 49.248333][ T4192] Preemption disabled at: [ 49.248340][ T4192] [] cgroup_get_from_path+0x30/0x300 [ 49.251447][ T4192] CPU: 0 PID: 4192 Comm: syz-executor382 Tainted: G W 5.15.177-syzkaller #0 [ 49.254135][ T4192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 49.256862][ T4192] Call trace: [ 49.257748][ T4192] dump_backtrace+0x0/0x530 [ 49.259119][ T4192] show_stack+0x2c/0x3c [ 49.260216][ T4192] dump_stack_lvl+0x108/0x170 [ 49.261638][ T4192] dump_stack+0x1c/0x58 [ 49.262739][ T4192] ___might_sleep+0x380/0x4dc [ 49.264044][ T4192] __might_sleep+0x98/0xf0 [ 49.265244][ T4192] down_read+0x34/0x398 [ 49.266382][ T4192] kernfs_walk_and_get_ns+0x8c/0x310 [ 49.267878][ T4192] cgroup_get_from_path+0x64/0x300 [ 49.269398][ T4192] cgroup_mt_check_v1+0x18c/0x278 [ 49.270883][ T4192] xt_check_match+0x338/0x914 [ 49.272281][ T4192] translate_table+0x10a0/0x1a98 [ 49.273604][ T4192] do_ipt_set_ctl+0xb8c/0x1164 [ 49.274901][ T4192] nf_setsockopt+0x270/0x290 [ 49.276140][ T4192] ip_setsockopt+0x1d70/0x32cc [ 49.277504][ T4192] udp_setsockopt+0xa4/0xbc [ 49.278755][ T4192] sock_common_setsockopt+0xb0/0xcc [ 49.280226][ T4192] __sys_setsockopt+0x3a8/0x6b4 [ 49.281532][ T4192] __arm64_sys_setsockopt+0xb8/0xd4 [ 49.282954][ T4192] invoke_syscall+0x98/0x2b8 [ 49.284226][ T4192] el0_svc_common+0x138/0x258 [ 49.285463][ T4192] do_el0_svc+0x58/0x14c [ 49.286583][ T4192] el0_svc+0x7c/0x1f0 [ 49.287684][ T4192] el0t_64_sync_handler+0x84/0xe4 [ 49.289057][ T4192] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 50.239693][ T4237] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 50.242117][ T4237] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4237, name: syz-executor382 [ 50.244838][ T4237] INFO: lockdep is turned off. [ 50.246237][ T4237] irq event stamp: 0 [ 50.247276][ T4237] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 50.249242][ T4237] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 50.251725][ T4237] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 50.254357][ T4237] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 50.256413][ T4237] Preemption disabled at: [ 50.256420][ T4237] [] cgroup_get_from_path+0x30/0x300 [ 50.259643][ T4237] CPU: 1 PID: 4237 Comm: syz-executor382 Tainted: G W 5.15.177-syzkaller #0 [ 50.262498][ T4237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 50.265339][ T4237] Call trace: [ 50.266169][ T4237] dump_backtrace+0x0/0x530 [ 50.267337][ T4237] show_stack+0x2c/0x3c [ 50.268488][ T4237] dump_stack_lvl+0x108/0x170 [ 50.269811][ T4237] dump_stack+0x1c/0x58 [ 50.270894][ T4237] ___might_sleep+0x380/0x4dc [ 50.272203][ T4237] __might_sleep+0x98/0xf0 [ 50.273378][ T4237] down_read+0x34/0x398 [ 50.274537][ T4237] kernfs_walk_and_get_ns+0x8c/0x310 [ 50.275896][ T4237] cgroup_get_from_path+0x64/0x300 [ 50.277235][ T4237] cgroup_mt_check_v1+0x18c/0x278 [ 50.278613][ T4237] xt_check_match+0x338/0x914 [ 50.279848][ T4237] translate_table+0x10a0/0x1a98 [ 50.281230][ T4237] do_ipt_set_ctl+0xb8c/0x1164 [ 50.282469][ T4237] nf_setsockopt+0x270/0x290 [ 50.283712][ T4237] ip_setsockopt+0x1d70/0x32cc [ 50.284948][ T4237] udp_setsockopt+0xa4/0xbc [ 50.286120][ T4237] sock_common_setsockopt+0xb0/0xcc [ 50.287441][ T4237] __sys_setsockopt+0x3a8/0x6b4 [ 50.288715][ T4237] __arm64_sys_setsockopt+0xb8/0xd4 [ 50.290056][ T4237] invoke_syscall+0x98/0x2b8 [ 50.291282][ T4237] el0_svc_common+0x138/0x258 [ 50.292476][ T4237] do_el0_svc+0x58/0x14c [ 50.293519][ T4237] el0_svc+0x7c/0x1f0 [ 50.294641][ T4237] el0t_64_sync_handler+0x84/0xe4 [ 50.296009][ T4237] el0t_64_sync+0x1a0/0x1a4 executing program executing program [ 50.343563][ T4239] cgroup_mt_check_v1: 210 callbacks suppressed [ 50.343577][ T4239] xt_cgroup: invalid path, errno=-2 executing program [ 50.374823][ T4240] xt_cgroup: invalid path, errno=-2 executing program [ 50.406274][ T4241] xt_cgroup: invalid path, errno=-2 executing program [ 50.437409][ T4242] xt_cgroup: invalid path, errno=-2 executing program [ 50.468706][ T4243] xt_cgroup: invalid path, errno=-2 executing program [ 50.500774][ T4244] xt_cgroup: invalid path, errno=-2 executing program [ 50.531943][ T4245] xt_cgroup: invalid path, errno=-2 executing program [ 50.563041][ T4246] xt_cgroup: invalid path, errno=-2 executing program [ 50.594597][ T4247] xt_cgroup: invalid path, errno=-2 executing program [ 50.625806][ T4248] xt_cgroup: invalid path, errno=-2 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 51.245851][ T4277] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 51.248520][ T4277] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4277, name: syz-executor382 [ 51.251360][ T4277] INFO: lockdep is turned off. [ 51.252688][ T4277] irq event stamp: 0 [ 51.253778][ T4277] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 51.255902][ T4277] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 51.258639][ T4277] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 51.261187][ T4277] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 51.263198][ T4277] Preemption disabled at: [ 51.263204][ T4277] [] cgroup_get_from_path+0x30/0x300 [ 51.266363][ T4277] CPU: 0 PID: 4277 Comm: syz-executor382 Tainted: G W 5.15.177-syzkaller #0 [ 51.269172][ T4277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 51.272057][ T4277] Call trace: [ 51.272977][ T4277] dump_backtrace+0x0/0x530 [ 51.274170][ T4277] show_stack+0x2c/0x3c [ 51.275288][ T4277] dump_stack_lvl+0x108/0x170 [ 51.276572][ T4277] dump_stack+0x1c/0x58 [ 51.277656][ T4277] ___might_sleep+0x380/0x4dc [ 51.278940][ T4277] __might_sleep+0x98/0xf0 [ 51.280115][ T4277] down_read+0x34/0x398 [ 51.281255][ T4277] kernfs_walk_and_get_ns+0x8c/0x310 [ 51.282740][ T4277] cgroup_get_from_path+0x64/0x300 [ 51.284181][ T4277] cgroup_mt_check_v1+0x18c/0x278 [ 51.285497][ T4277] xt_check_match+0x338/0x914 [ 51.286763][ T4277] translate_table+0x10a0/0x1a98 [ 51.288216][ T4277] do_ipt_set_ctl+0xb8c/0x1164 [ 51.289505][ T4277] nf_setsockopt+0x270/0x290 [ 51.290800][ T4277] ip_setsockopt+0x1d70/0x32cc [ 51.292005][ T4277] udp_setsockopt+0xa4/0xbc [ 51.293264][ T4277] sock_common_setsockopt+0xb0/0xcc [ 51.294659][ T4277] __sys_setsockopt+0x3a8/0x6b4 [ 51.295975][ T4277] __arm64_sys_setsockopt+0xb8/0xd4 [ 51.297490][ T4277] invoke_syscall+0x98/0x2b8 [ 51.298749][ T4277] el0_svc_common+0x138/0x258 [ 51.300111][ T4277] do_el0_svc+0x58/0x14c [ 51.301221][ T4277] el0_svc+0x7c/0x1f0 [ 51.302246][ T4277] el0t_64_sync_handler+0x84/0xe4 [ 51.303553][ T4277] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 52.255751][ T4322] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 52.258455][ T4322] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4322, name: syz-executor382 [ 52.261047][ T4322] INFO: lockdep is turned off. [ 52.262302][ T4322] irq event stamp: 0 [ 52.263262][ T4322] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 52.265230][ T4322] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 52.267730][ T4322] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 52.270269][ T4322] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 52.272194][ T4322] Preemption disabled at: [ 52.272201][ T4322] [] cgroup_get_from_path+0x30/0x300 [ 52.275320][ T4322] CPU: 0 PID: 4322 Comm: syz-executor382 Tainted: G W 5.15.177-syzkaller #0 [ 52.278177][ T4322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 52.281030][ T4322] Call trace: [ 52.281956][ T4322] dump_backtrace+0x0/0x530 [ 52.283342][ T4322] show_stack+0x2c/0x3c [ 52.284546][ T4322] dump_stack_lvl+0x108/0x170 [ 52.285828][ T4322] dump_stack+0x1c/0x58 [ 52.286954][ T4322] ___might_sleep+0x380/0x4dc [ 52.288261][ T4322] __might_sleep+0x98/0xf0 [ 52.289695][ T4322] down_read+0x34/0x398 [ 52.290904][ T4322] kernfs_walk_and_get_ns+0x8c/0x310 [ 52.292358][ T4322] cgroup_get_from_path+0x64/0x300 [ 52.293744][ T4322] cgroup_mt_check_v1+0x18c/0x278 [ 52.295106][ T4322] xt_check_match+0x338/0x914 [ 52.296441][ T4322] translate_table+0x10a0/0x1a98 [ 52.297760][ T4322] do_ipt_set_ctl+0xb8c/0x1164 [ 52.299053][ T4322] nf_setsockopt+0x270/0x290 [ 52.300322][ T4322] ip_setsockopt+0x1d70/0x32cc [ 52.301616][ T4322] udp_setsockopt+0xa4/0xbc [ 52.302843][ T4322] sock_common_setsockopt+0xb0/0xcc [ 52.304244][ T4322] __sys_setsockopt+0x3a8/0x6b4 [ 52.305503][ T4322] __arm64_sys_setsockopt+0xb8/0xd4 [ 52.306884][ T4322] invoke_syscall+0x98/0x2b8 [ 52.308108][ T4322] el0_svc_common+0x138/0x258 [ 52.309405][ T4322] do_el0_svc+0x58/0x14c [ 52.310521][ T4322] el0_svc+0x7c/0x1f0 [ 52.311526][ T4322] el0t_64_sync_handler+0x84/0xe4 [ 52.312865][ T4322] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 53.265143][ T4367] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 53.267786][ T4367] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4367, name: syz-executor382 [ 53.270447][ T4367] INFO: lockdep is turned off. [ 53.271696][ T4367] irq event stamp: 0 [ 53.272720][ T4367] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 53.274724][ T4367] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 53.277194][ T4367] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 53.279787][ T4367] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 53.281797][ T4367] Preemption disabled at: [ 53.281804][ T4367] [] cgroup_get_from_path+0x30/0x300 [ 53.284877][ T4367] CPU: 0 PID: 4367 Comm: syz-executor382 Tainted: G W 5.15.177-syzkaller #0 [ 53.287704][ T4367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 53.290672][ T4367] Call trace: [ 53.291641][ T4367] dump_backtrace+0x0/0x530 [ 53.292885][ T4367] show_stack+0x2c/0x3c [ 53.294108][ T4367] dump_stack_lvl+0x108/0x170 [ 53.295382][ T4367] dump_stack+0x1c/0x58 [ 53.296569][ T4367] ___might_sleep+0x380/0x4dc [ 53.297881][ T4367] __might_sleep+0x98/0xf0 [ 53.299183][ T4367] down_read+0x34/0x398 [ 53.300294][ T4367] kernfs_walk_and_get_ns+0x8c/0x310 [ 53.301706][ T4367] cgroup_get_from_path+0x64/0x300 [ 53.303186][ T4367] cgroup_mt_check_v1+0x18c/0x278 [ 53.304718][ T4367] xt_check_match+0x338/0x914 [ 53.306046][ T4367] translate_table+0x10a0/0x1a98 [ 53.307410][ T4367] do_ipt_set_ctl+0xb8c/0x1164 [ 53.308812][ T4367] nf_setsockopt+0x270/0x290 [ 53.310089][ T4367] ip_setsockopt+0x1d70/0x32cc [ 53.311431][ T4367] udp_setsockopt+0xa4/0xbc [ 53.312626][ T4367] sock_common_setsockopt+0xb0/0xcc [ 53.314096][ T4367] __sys_setsockopt+0x3a8/0x6b4 [ 53.315381][ T4367] __arm64_sys_setsockopt+0xb8/0xd4 [ 53.316836][ T4367] invoke_syscall+0x98/0x2b8 [ 53.318138][ T4367] el0_svc_common+0x138/0x258 [ 53.319415][ T4367] do_el0_svc+0x58/0x14c [ 53.320602][ T4367] el0_svc+0x7c/0x1f0 [ 53.321674][ T4367] el0t_64_sync_handler+0x84/0xe4 [ 53.323117][ T4367] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 54.274157][ T4412] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 [ 54.276791][ T4412] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4412, name: syz-executor382 [ 54.279364][ T4412] INFO: lockdep is turned off. [ 54.280642][ T4412] irq event stamp: 0 [ 54.281703][ T4412] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 54.283701][ T4412] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 54.286189][ T4412] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 54.288852][ T4412] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 54.290864][ T4412] Preemption disabled at: [ 54.290871][ T4412] [] cgroup_get_from_path+0x30/0x300 [ 54.293821][ T4412] CPU: 0 PID: 4412 Comm: syz-executor382 Tainted: G W 5.15.177-syzkaller #0 [ 54.296604][ T4412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 54.299535][ T4412] Call trace: [ 54.300402][ T4412] dump_backtrace+0x0/0x530 [ 54.301649][ T4412] show_stack+0x2c/0x3c [ 54.302822][ T4412] dump_stack_lvl+0x108/0x170 [ 54.304135][ T4412] dump_stack+0x1c/0x58 [ 54.305293][ T4412] ___might_sleep+0x380/0x4dc [ 54.306560][ T4412] __might_sleep+0x98/0xf0 [ 54.307906][ T4412] down_read+0x34/0x398 [ 54.309044][ T4412] kernfs_walk_and_get_ns+0x8c/0x310 [ 54.310516][ T4412] cgroup_get_from_path+0x64/0x300 [ 54.311922][ T4412] cgroup_mt_check_v1+0x18c/0x278 [ 54.313196][ T4412] xt_check_match+0x338/0x914 [ 54.314510][ T4412] translate_table+0x10a0/0x1a98 [ 54.316029][ T4412] do_ipt_set_ctl+0xb8c/0x1164 [ 54.317430][ T4412] nf_setsockopt+0x270/0x290 [ 54.318649][ T4412] ip_setsockopt+0x1d70/0x32cc [ 54.319903][ T4412] udp_setsockopt+0xa4/0xbc [ 54.321136][ T4412] sock_common_setsockopt+0xb0/0xcc [ 54.322664][ T4412] __sys_setsockopt+0x3a8/0x6b4 [ 54.324000][ T4412] __arm64_sys_setsockopt+0xb8/0xd4 [ 54.325424][ T4412] invoke_syscall+0x98/0x2b8 [ 54.326723][ T4412] el0_svc_common+0x138/0x258 [ 54.327992][ T4412] do_el0_svc+0x58/0x14c [ 54.329262][ T4412] el0_svc+0x7c/0x1f0 [ 54.330320][ T4412] el0t_64_sync_handler+0x84/0xe4 [ 54.331683][ T4412] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program