Warning: Permanently added '10.128.1.115' (ED25519) to the list of known hosts.
executing program
[   40.719306][ T4018] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497
[   40.722126][ T4018] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4018, name: syz-executor142
[   40.724960][ T4018] 1 lock held by syz-executor142/4018:
[   40.726493][ T4018]  #0: ffff800014cb6ad8 (css_set_lock){....}-{2:2}, at: cgroup_get_from_path+0x30/0x300
[   40.729427][ T4018] irq event stamp: 488
[   40.730564][ T4018] hardirqs last  enabled at (487): [<ffff80000826a1dc>] finish_lock_switch+0xbc/0x1e8
[   40.733243][ T4018] hardirqs last disabled at (488): [<ffff800011b8edec>] _raw_spin_lock_irq+0x38/0x13c
[   40.736001][ T4018] softirqs last  enabled at (470): [<ffff80000fe71028>] release_sock+0x1e4/0x270
[   40.738525][ T4018] softirqs last disabled at (468): [<ffff80000fe70e80>] release_sock+0x3c/0x270
[   40.741099][ T4018] Preemption disabled at:
[   40.741109][ T4018] [<ffff800008452994>] cgroup_get_from_path+0x30/0x300
executing program
executing program
executing program
[   40.744207][ T4018] CPU: 0 PID: 4018 Comm: syz-executor142 Not tainted 5.15.164-syzkaller #0
executing program
executing program
executing program
executing program
[   40.746610][ T4018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[   40.749501][ T4018] Call trace:
[   40.750477][ T4018]  dump_backtrace+0x0/0x530
[   40.751753][ T4018]  show_stack+0x2c/0x3c
executing program
executing program
executing program
executing program
[   40.752867][ T4018]  dump_stack_lvl+0x108/0x170
[   40.754148][ T4018]  dump_stack+0x1c/0x58
[   40.755297][ T4018]  ___might_sleep+0x380/0x4dc
executing program
executing program
executing program
[   40.756591][ T4018]  __might_sleep+0x98/0xf0
executing program
[   40.757802][ T4018]  down_read+0x34/0x398
[   40.758931][ T4018]  kernfs_walk_and_get_ns+0x8c/0x310
[   40.760441][ T4018]  cgroup_get_from_path+0x64/0x300
[   40.761897][ T4018]  cgroup_mt_check_v1+0x18c/0x278
[   40.763301][ T4018]  xt_check_match+0x338/0x914
[   40.764583][ T4018]  translate_table+0x10a0/0x1a98
[   40.766033][ T4018]  do_ipt_set_ctl+0xb8c/0x1164
[   40.767313][ T4018]  nf_setsockopt+0x270/0x290
[   40.768584][ T4018]  ip_setsockopt+0x1d70/0x32cc
[   40.769910][ T4018]  tcp_setsockopt+0x204/0x33ec
[   40.771269][ T4018]  sock_common_setsockopt+0xb0/0xcc
[   40.772760][ T4018]  __sys_setsockopt+0x3a8/0x6b4
[   40.774110][ T4018]  __arm64_sys_setsockopt+0xb8/0xd4
[   40.775544][ T4018]  invoke_syscall+0x98/0x2b8
executing program
executing program
executing program
[   40.776783][ T4018]  el0_svc_common+0x138/0x258
[   40.778061][ T4018]  do_el0_svc+0x58/0x14c
[   40.779219][ T4018]  el0_svc+0x7c/0x1f0
[   40.780341][ T4018]  el0t_64_sync_handler+0x84/0xe4
[   40.781742][ T4018]  el0t_64_sync+0x1a0/0x1a4
[   40.783012][ T4018] 
[   40.783665][ T4018] =============================
[   40.785027][ T4018] [ BUG: Invalid wait context ]
[   40.786329][ T4018] 5.15.164-syzkaller #0 Tainted: G        W        
[   40.788177][ T4018] -----------------------------
executing program
[   40.789531][ T4018] syz-executor142/4018 is trying to lock:
[   40.791111][ T4018] ffff800014db7410 (kernfs_rwsem){++++}-{3:3}, at: kernfs_walk_and_get_ns+0x8c/0x310
[   40.793797][ T4018] other info that might help us debug this:
[   40.795374][ T4018] context-{4:4}
[   40.796303][ T4018] 1 lock held by syz-executor142/4018:
[   40.797801][ T4018]  #0: ffff800014cb6ad8 (css_set_lock){....}-{2:2}, at: cgroup_get_from_path+0x30/0x300
[   40.800473][ T4018] stack backtrace:
[   40.801469][ T4018] CPU: 0 PID: 4018 Comm: syz-executor142 Tainted: G        W         5.15.164-syzkaller #0
[   40.804164][ T4018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[   40.806875][ T4018] Call trace:
[   40.807752][ T4018]  dump_backtrace+0x0/0x530
[   40.808964][ T4018]  show_stack+0x2c/0x3c
[   40.810085][ T4018]  dump_stack_lvl+0x108/0x170
[   40.811354][ T4018]  dump_stack+0x1c/0x58
[   40.812490][ T4018]  __lock_acquire+0x1af0/0x7638
[   40.813786][ T4018]  lock_acquire+0x240/0x77c
[   40.815012][ T4018]  down_read+0xc0/0x398
executing program
executing program
executing program
[   40.816140][ T4018]  kernfs_walk_and_get_ns+0x8c/0x310
[   40.817650][ T4018]  cgroup_get_from_path+0x64/0x300
[   40.819026][ T4018]  cgroup_mt_check_v1+0x18c/0x278
[   40.820454][ T4018]  xt_check_match+0x338/0x914
[   40.821711][ T4018]  translate_table+0x10a0/0x1a98
[   40.823049][ T4018]  do_ipt_set_ctl+0xb8c/0x1164
[   40.824338][ T4018]  nf_setsockopt+0x270/0x290
[   40.825680][ T4018]  ip_setsockopt+0x1d70/0x32cc
[   40.826992][ T4018]  tcp_setsockopt+0x204/0x33ec
[   40.828350][ T4018]  sock_common_setsockopt+0xb0/0xcc
[   40.829850][ T4018]  __sys_setsockopt+0x3a8/0x6b4
[   40.831224][ T4018]  __arm64_sys_setsockopt+0xb8/0xd4
[   40.832657][ T4018]  invoke_syscall+0x98/0x2b8
[   40.833903][ T4018]  el0_svc_common+0x138/0x258
[   40.835176][ T4018]  do_el0_svc+0x58/0x14c
[   40.836373][ T4018]  el0_svc+0x7c/0x1f0
[   40.837469][ T4018]  el0t_64_sync_handler+0x84/0xe4
[   40.838830][ T4018]  el0t_64_sync+0x1a0/0x1a4
executing program
[   40.841600][ T4018] xt_cgroup: invalid path, errno=-2
[   40.853263][ T4019] xt_cgroup: invalid path, errno=-2
[   40.864240][ T4020] xt_cgroup: invalid path, errno=-2
[   40.874932][ T4021] xt_cgroup: invalid path, errno=-2
[   40.885581][ T4022] xt_cgroup: invalid path, errno=-2
[   40.896420][ T4023] xt_cgroup: invalid path, errno=-2
[   40.907165][ T4024] xt_cgroup: invalid path, errno=-2
[   40.918031][ T4025] xt_cgroup: invalid path, errno=-2
[   40.928883][ T4026] xt_cgroup: invalid path, errno=-2
[   40.939737][ T4027] xt_cgroup: invalid path, errno=-2
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[   41.723220][ T4099] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497
[   41.725967][ T4099] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4099, name: syz-executor142
[   41.728606][ T4099] INFO: lockdep is turned off.
[   41.729866][ T4099] irq event stamp: 0
[   41.730956][ T4099] hardirqs last  enabled at (0): [<0000000000000000>] 0x0
[   41.732932][ T4099] hardirqs last disabled at (0): [<ffff80000819194c>] copy_process+0x129c/0x3750
[   41.735393][ T4099] softirqs last  enabled at (0): [<ffff800008191974>] copy_process+0x12c4/0x3750
[   41.737820][ T4099] softirqs last disabled at (0): [<0000000000000000>] 0x0
[   41.739721][ T4099] Preemption disabled at:
[   41.739729][ T4099] [<ffff800008452994>] cgroup_get_from_path+0x30/0x300
[   41.742770][ T4099] CPU: 1 PID: 4099 Comm: syz-executor142 Tainted: G        W         5.15.164-syzkaller #0
[   41.745595][ T4099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[   41.748291][ T4099] Call trace:
[   41.749168][ T4099]  dump_backtrace+0x0/0x530
[   41.750347][ T4099]  show_stack+0x2c/0x3c
[   41.751516][ T4099]  dump_stack_lvl+0x108/0x170
[   41.752877][ T4099]  dump_stack+0x1c/0x58
[   41.753874][ T4099]  ___might_sleep+0x380/0x4dc
[   41.755074][ T4099]  __might_sleep+0x98/0xf0
[   41.756300][ T4099]  down_read+0x34/0x398
[   41.757451][ T4099]  kernfs_walk_and_get_ns+0x8c/0x310
[   41.758901][ T4099]  cgroup_get_from_path+0x64/0x300
[   41.760254][ T4099]  cgroup_mt_check_v1+0x18c/0x278
[   41.761583][ T4099]  xt_check_match+0x338/0x914
[   41.762840][ T4099]  translate_table+0x10a0/0x1a98
executing program
executing program
[   41.764211][ T4099]  do_ipt_set_ctl+0xb8c/0x1164
executing program
[   41.765578][ T4099]  nf_setsockopt+0x270/0x290
[   41.766885][ T4099]  ip_setsockopt+0x1d70/0x32cc
[   41.768227][ T4099]  tcp_setsockopt+0x204/0x33ec
[   41.769537][ T4099]  sock_common_setsockopt+0xb0/0xcc
[   41.770888][ T4099]  __sys_setsockopt+0x3a8/0x6b4
[   41.772207][ T4099]  __arm64_sys_setsockopt+0xb8/0xd4
[   41.773620][ T4099]  invoke_syscall+0x98/0x2b8
[   41.774874][ T4099]  el0_svc_common+0x138/0x258
[   41.776126][ T4099]  do_el0_svc+0x58/0x14c
[   41.777257][ T4099]  el0_svc+0x7c/0x1f0
[   41.778368][ T4099]  el0t_64_sync_handler+0x84/0xe4
[   41.779721][ T4099]  el0t_64_sync+0x1a0/0x1a4
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[   42.723067][ T4186] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497
[   42.725689][ T4186] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4186, name: syz-executor142
[   42.728339][ T4186] INFO: lockdep is turned off.
[   42.729592][ T4186] irq event stamp: 0
[   42.730650][ T4186] hardirqs last  enabled at (0): [<0000000000000000>] 0x0
[   42.732580][ T4186] hardirqs last disabled at (0): [<ffff80000819194c>] copy_process+0x129c/0x3750
[   42.735012][ T4186] softirqs last  enabled at (0): [<ffff800008191974>] copy_process+0x12c4/0x3750
[   42.737447][ T4186] softirqs last disabled at (0): [<0000000000000000>] 0x0
[   42.739334][ T4186] Preemption disabled at:
[   42.739341][ T4186] [<ffff800008452994>] cgroup_get_from_path+0x30/0x300
[   42.742245][ T4186] CPU: 1 PID: 4186 Comm: syz-executor142 Tainted: G        W         5.15.164-syzkaller #0
[   42.744974][ T4186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[   42.747641][ T4186] Call trace:
[   42.748510][ T4186]  dump_backtrace+0x0/0x530
[   42.749707][ T4186]  show_stack+0x2c/0x3c
[   42.750854][ T4186]  dump_stack_lvl+0x108/0x170
[   42.752105][ T4186]  dump_stack+0x1c/0x58
[   42.753189][ T4186]  ___might_sleep+0x380/0x4dc
[   42.754437][ T4186]  __might_sleep+0x98/0xf0
[   42.755615][ T4186]  down_read+0x34/0x398
[   42.756706][ T4186]  kernfs_walk_and_get_ns+0x8c/0x310
[   42.758072][ T4186]  cgroup_get_from_path+0x64/0x300
[   42.759429][ T4186]  cgroup_mt_check_v1+0x18c/0x278
[   42.760744][ T4186]  xt_check_match+0x338/0x914
[   42.761956][ T4186]  translate_table+0x10a0/0x1a98
[   42.763246][ T4186]  do_ipt_set_ctl+0xb8c/0x1164
executing program
executing program
[   42.764501][ T4186]  nf_setsockopt+0x270/0x290
[   42.765704][ T4186]  ip_setsockopt+0x1d70/0x32cc
[   42.766970][ T4186]  tcp_setsockopt+0x204/0x33ec
[   42.768216][ T4186]  sock_common_setsockopt+0xb0/0xcc
executing program
[   42.769569][ T4186]  __sys_setsockopt+0x3a8/0x6b4
[   42.770847][ T4186]  __arm64_sys_setsockopt+0xb8/0xd4
[   42.772242][ T4186]  invoke_syscall+0x98/0x2b8
[   42.773441][ T4186]  el0_svc_common+0x138/0x258
[   42.774663][ T4186]  do_el0_svc+0x58/0x14c
[   42.775777][ T4186]  el0_svc+0x7c/0x1f0
[   42.776839][ T4186]  el0t_64_sync_handler+0x84/0xe4
[   42.778156][ T4186]  el0t_64_sync+0x1a0/0x1a4
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[   43.724445][ T4273] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497
[   43.726984][ T4273] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4273, name: syz-executor142
[   43.729510][ T4273] INFO: lockdep is turned off.
[   43.730719][ T4273] irq event stamp: 0
[   43.731703][ T4273] hardirqs last  enabled at (0): [<0000000000000000>] 0x0
[   43.733534][ T4273] hardirqs last disabled at (0): [<ffff80000819194c>] copy_process+0x129c/0x3750
[   43.736073][ T4273] softirqs last  enabled at (0): [<ffff800008191974>] copy_process+0x12c4/0x3750
[   43.738549][ T4273] softirqs last disabled at (0): [<0000000000000000>] 0x0
[   43.740418][ T4273] Preemption disabled at:
[   43.740425][ T4273] [<ffff800008452994>] cgroup_get_from_path+0x30/0x300
[   43.743368][ T4273] CPU: 1 PID: 4273 Comm: syz-executor142 Tainted: G        W         5.15.164-syzkaller #0
[   43.746004][ T4273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[   43.748702][ T4273] Call trace:
[   43.749538][ T4273]  dump_backtrace+0x0/0x530
[   43.750720][ T4273]  show_stack+0x2c/0x3c
[   43.751795][ T4273]  dump_stack_lvl+0x108/0x170
[   43.752999][ T4273]  dump_stack+0x1c/0x58
[   43.754093][ T4273]  ___might_sleep+0x380/0x4dc
[   43.755295][ T4273]  __might_sleep+0x98/0xf0
[   43.756432][ T4273]  down_read+0x34/0x398
[   43.757518][ T4273]  kernfs_walk_and_get_ns+0x8c/0x310
[   43.758919][ T4273]  cgroup_get_from_path+0x64/0x300
[   43.760251][ T4273]  cgroup_mt_check_v1+0x18c/0x278
[   43.761551][ T4273]  xt_check_match+0x338/0x914
[   43.762770][ T4273]  translate_table+0x10a0/0x1a98
[   43.764090][ T4273]  do_ipt_set_ctl+0xb8c/0x1164
[   43.765365][ T4273]  nf_setsockopt+0x270/0x290
[   43.766577][ T4273]  ip_setsockopt+0x1d70/0x32cc
[   43.767827][ T4273]  tcp_setsockopt+0x204/0x33ec
[   43.769059][ T4273]  sock_common_setsockopt+0xb0/0xcc
[   43.770408][ T4273]  __sys_setsockopt+0x3a8/0x6b4
[   43.771681][ T4273]  __arm64_sys_setsockopt+0xb8/0xd4
[   43.773026][ T4273]  invoke_syscall+0x98/0x2b8
[   43.774256][ T4273]  el0_svc_common+0x138/0x258
[   43.775468][ T4273]  do_el0_svc+0x58/0x14c
[   43.776551][ T4273]  el0_svc+0x7c/0x1f0
[   43.777571][ T4273]  el0t_64_sync_handler+0x84/0xe4
[   43.778874][ T4273]  el0t_64_sync+0x1a0/0x1a4
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[   44.733592][ T4361] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497
[   44.736247][ T4361] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4361, name: syz-executor142
[   44.738849][ T4361] INFO: lockdep is turned off.
[   44.740215][ T4361] irq event stamp: 0
[   44.741248][ T4361] hardirqs last  enabled at (0): [<0000000000000000>] 0x0
[   44.743118][ T4361] hardirqs last disabled at (0): [<ffff80000819194c>] copy_process+0x129c/0x3750
[   44.745529][ T4361] softirqs last  enabled at (0): [<ffff800008191974>] copy_process+0x12c4/0x3750
[   44.747898][ T4361] softirqs last disabled at (0): [<0000000000000000>] 0x0
[   44.749769][ T4361] Preemption disabled at:
[   44.749777][ T4361] [<ffff800008452994>] cgroup_get_from_path+0x30/0x300
[   44.752803][ T4361] CPU: 1 PID: 4361 Comm: syz-executor142 Tainted: G        W         5.15.164-syzkaller #0
[   44.755499][ T4361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[   44.758148][ T4361] Call trace:
[   44.759109][ T4361]  dump_backtrace+0x0/0x530
[   44.760307][ T4361]  show_stack+0x2c/0x3c
[   44.761563][ T4361]  dump_stack_lvl+0x108/0x170
[   44.762884][ T4361]  dump_stack+0x1c/0x58
[   44.763978][ T4361]  ___might_sleep+0x380/0x4dc
[   44.765225][ T4361]  __might_sleep+0x98/0xf0
[   44.766355][ T4361]  down_read+0x34/0x398
[   44.767496][ T4361]  kernfs_walk_and_get_ns+0x8c/0x310
[   44.768901][ T4361]  cgroup_get_from_path+0x64/0x300
[   44.770284][ T4361]  cgroup_mt_check_v1+0x18c/0x278
[   44.771621][ T4361]  xt_check_match+0x338/0x914
[   44.772951][ T4361]  translate_table+0x10a0/0x1a98
[   44.774303][ T4361]  do_ipt_set_ctl+0xb8c/0x1164
[   44.775579][ T4361]  nf_setsockopt+0x270/0x290
[   44.776888][ T4361]  ip_setsockopt+0x1d70/0x32cc
[   44.778175][ T4361]  tcp_setsockopt+0x204/0x33ec
[   44.779426][ T4361]  sock_common_setsockopt+0xb0/0xcc
[   44.780779][ T4361]  __sys_setsockopt+0x3a8/0x6b4
[   44.782183][ T4361]  __arm64_sys_setsockopt+0xb8/0xd4
[   44.783566][ T4361]  invoke_syscall+0x98/0x2b8
[   44.784774][ T4361]  el0_svc_common+0x138/0x258
[   44.786004][ T4361]  do_el0_svc+0x58/0x14c
[   44.787109][ T4361]  el0_svc+0x7c/0x1f0
[   44.788142][ T4361]  el0t_64_sync_handler+0x84/0xe4
[   44.789494][ T4361]  el0t_64_sync+0x1a0/0x1a4
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[   45.735433][ T4448] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497
[   45.737921][ T4448] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4448, name: syz-executor142
[   45.740428][ T4448] INFO: lockdep is turned off.
[   45.741648][ T4448] irq event stamp: 0
[   45.742653][ T4448] hardirqs last  enabled at (0): [<0000000000000000>] 0x0
[   45.744501][ T4448] hardirqs last disabled at (0): [<ffff80000819194c>] copy_process+0x129c/0x3750
[   45.746959][ T4448] softirqs last  enabled at (0): [<ffff800008191974>] copy_process+0x12c4/0x3750
[   45.749395][ T4448] softirqs last disabled at (0): [<0000000000000000>] 0x0
[   45.751310][ T4448] Preemption disabled at:
[   45.751317][ T4448] [<ffff800008452994>] cgroup_get_from_path+0x30/0x300
[   45.754232][ T4448] CPU: 1 PID: 4448 Comm: syz-executor142 Tainted: G        W         5.15.164-syzkaller #0
[   45.757015][ T4448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[   45.759712][ T4448] Call trace:
[   45.760562][ T4448]  dump_backtrace+0x0/0x530
[   45.761735][ T4448]  show_stack+0x2c/0x3c
[   45.762823][ T4448]  dump_stack_lvl+0x108/0x170
[   45.764184][ T4448]  dump_stack+0x1c/0x58
[   45.765390][ T4448]  ___might_sleep+0x380/0x4dc
[   45.766664][ T4448]  __might_sleep+0x98/0xf0
[   45.767837][ T4448]  down_read+0x34/0x398
[   45.768932][ T4448]  kernfs_walk_and_get_ns+0x8c/0x310
[   45.770356][ T4448]  cgroup_get_from_path+0x64/0x300
[   45.771674][ T4448]  cgroup_mt_check_v1+0x18c/0x278
[   45.773068][ T4448]  xt_check_match+0x338/0x914
[   45.774345][ T4448]  translate_table+0x10a0/0x1a98
[   45.775679][ T4448]  do_ipt_set_ctl+0xb8c/0x1164
[   45.776982][ T4448]  nf_setsockopt+0x270/0x290
[   45.778289][ T4448]  ip_setsockopt+0x1d70/0x32cc
[   45.779619][ T4448]  tcp_setsockopt+0x204/0x33ec
[   45.780944][ T4448]  sock_common_setsockopt+0xb0/0xcc
[   45.782415][ T4448]  __sys_setsockopt+0x3a8/0x6b4
[   45.783735][ T4448]  __arm64_sys_setsockopt+0xb8/0xd4
[   45.785114][ T4448]  invoke_syscall+0x98/0x2b8
[   45.786401][ T4448]  el0_svc_common+0x138/0x258
[   45.787688][ T4448]  do_el0_svc+0x58/0x14c
[   45.788873][ T4448]  el0_svc+0x7c/0x1f0
[   45.789991][ T4448]  el0t_64_sync_handler+0x84/0xe4
[   45.791416][ T4448]  el0t_64_sync+0x1a0/0x1a4
executing program
executing program
executing program
executing program
executing program
executing program
[   45.850176][ T4454] cgroup_mt_check_v1: 426 callbacks suppressed
[   45.850190][ T4454] xt_cgroup: invalid path, errno=-2
executing program
[   45.861060][ T4455] xt_cgroup: invalid path, errno=-2
executing program
[   45.871980][ T4456] xt_cgroup: invalid path, errno=-2
executing program
[   45.882724][ T4457] xt_cgroup: invalid path, errno=-2
executing program
[   45.893511][ T4458] xt_cgroup: invalid path, errno=-2
executing program
[   45.904637][ T4459] xt_cgroup: invalid path, errno=-2
executing program
[   45.915272][ T4460] xt_cgroup: invalid path, errno=-2
executing program
[   45.926000][ T4461] xt_cgroup: invalid path, errno=-2
executing program
[   45.936884][ T4462] xt_cgroup: invalid path, errno=-2
executing program
[   45.947670][ T4463] xt_cgroup: invalid path, errno=-2
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[   46.744816][ T4536] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497
[   46.747525][ T4536] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4536, name: syz-executor142
[   46.750005][ T4536] INFO: lockdep is turned off.
[   46.751229][ T4536] irq event stamp: 0
[   46.752301][ T4536] hardirqs last  enabled at (0): [<0000000000000000>] 0x0
[   46.754181][ T4536] hardirqs last disabled at (0): [<ffff80000819194c>] copy_process+0x129c/0x3750
[   46.756737][ T4536] softirqs last  enabled at (0): [<ffff800008191974>] copy_process+0x12c4/0x3750
[   46.759244][ T4536] softirqs last disabled at (0): [<0000000000000000>] 0x0
[   46.761191][ T4536] Preemption disabled at:
[   46.761198][ T4536] [<ffff800008452994>] cgroup_get_from_path+0x30/0x300
[   46.764250][ T4536] CPU: 1 PID: 4536 Comm: syz-executor142 Tainted: G        W         5.15.164-syzkaller #0
[   46.767050][ T4536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[   46.769872][ T4536] Call trace:
[   46.770752][ T4536]  dump_backtrace+0x0/0x530
[   46.772027][ T4536]  show_stack+0x2c/0x3c
[   46.773221][ T4536]  dump_stack_lvl+0x108/0x170
[   46.774486][ T4536]  dump_stack+0x1c/0x58
[   46.775666][ T4536]  ___might_sleep+0x380/0x4dc
[   46.777023][ T4536]  __might_sleep+0x98/0xf0
[   46.778268][ T4536]  down_read+0x34/0x398
[   46.779444][ T4536]  kernfs_walk_and_get_ns+0x8c/0x310
[   46.780943][ T4536]  cgroup_get_from_path+0x64/0x300
[   46.782421][ T4536]  cgroup_mt_check_v1+0x18c/0x278
[   46.783889][ T4536]  xt_check_match+0x338/0x914
[   46.785235][ T4536]  translate_table+0x10a0/0x1a98
[   46.786659][ T4536]  do_ipt_set_ctl+0xb8c/0x1164
[   46.787938][ T4536]  nf_setsockopt+0x270/0x290
[   46.789193][ T4536]  ip_setsockopt+0x1d70/0x32cc
[   46.790526][ T4536]  tcp_setsockopt+0x204/0x33ec
[   46.791826][ T4536]  sock_common_setsockopt+0xb0/0xcc
[   46.793205][ T4536]  __sys_setsockopt+0x3a8/0x6b4
[   46.794521][ T4536]  __arm64_sys_setsockopt+0xb8/0xd4
[   46.795949][ T4536]  invoke_syscall+0x98/0x2b8
[   46.797358][ T4536]  el0_svc_common+0x138/0x258
[   46.798693][ T4536]  do_el0_svc+0x58/0x14c
[   46.799868][ T4536]  el0_svc+0x7c/0x1f0
[   46.800935][ T4536]  el0t_64_sync_handler+0x84/0xe4
[   46.802280][ T4536]  el0t_64_sync+0x1a0/0x1a4
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[   47.746221][ T4622] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497
[   47.748703][ T4622] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4622, name: syz-executor142
[   47.751256][ T4622] INFO: lockdep is turned off.
[   47.752535][ T4622] irq event stamp: 0
[   47.753585][ T4622] hardirqs last  enabled at (0): [<0000000000000000>] 0x0
[   47.755581][ T4622] hardirqs last disabled at (0): [<ffff80000819194c>] copy_process+0x129c/0x3750
[   47.758179][ T4622] softirqs last  enabled at (0): [<ffff800008191974>] copy_process+0x12c4/0x3750
[   47.760750][ T4622] softirqs last disabled at (0): [<0000000000000000>] 0x0
[   47.762776][ T4622] Preemption disabled at:
[   47.762783][ T4622] [<ffff800008452994>] cgroup_get_from_path+0x30/0x300
[   47.765934][ T4622] CPU: 0 PID: 4622 Comm: syz-executor142 Tainted: G        W         5.15.164-syzkaller #0
[   47.768717][ T4622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[   47.771827][ T4622] Call trace:
[   47.772768][ T4622]  dump_backtrace+0x0/0x530
[   47.773991][ T4622]  show_stack+0x2c/0x3c
[   47.775320][ T4622]  dump_stack_lvl+0x108/0x170
[   47.776673][ T4622]  dump_stack+0x1c/0x58
[   47.777836][ T4622]  ___might_sleep+0x380/0x4dc
[   47.779122][ T4622]  __might_sleep+0x98/0xf0
[   47.780531][ T4622]  down_read+0x34/0x398
[   47.781721][ T4622]  kernfs_walk_and_get_ns+0x8c/0x310
[   47.783271][ T4622]  cgroup_get_from_path+0x64/0x300
[   47.784730][ T4622]  cgroup_mt_check_v1+0x18c/0x278
[   47.786201][ T4622]  xt_check_match+0x338/0x914
[   47.787572][ T4622]  translate_table+0x10a0/0x1a98
[   47.789020][ T4622]  do_ipt_set_ctl+0xb8c/0x1164
[   47.790351][ T4622]  nf_setsockopt+0x270/0x290
[   47.791659][ T4622]  ip_setsockopt+0x1d70/0x32cc
[   47.793074][ T4622]  tcp_setsockopt+0x204/0x33ec
[   47.794464][ T4622]  sock_common_setsockopt+0xb0/0xcc
[   47.795890][ T4622]  __sys_setsockopt+0x3a8/0x6b4
[   47.797280][ T4622]  __arm64_sys_setsockopt+0xb8/0xd4
[   47.798862][ T4622]  invoke_syscall+0x98/0x2b8
[   47.800143][ T4622]  el0_svc_common+0x138/0x258
[   47.801477][ T4622]  do_el0_svc+0x58/0x14c
[   47.802660][ T4622]  el0_svc+0x7c/0x1f0
[   47.803786][ T4622]  el0t_64_sync_handler+0x84/0xe4
[   47.805225][ T4622]  el0t_64_sync+0x1a0/0x1a4
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[   48.745776][ T4708] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497
[   48.748508][ T4708] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4708, name: syz-executor142
[   48.751194][ T4708] INFO: lockdep is turned off.
[   48.752504][ T4708] irq event stamp: 0
[   48.753563][ T4708] hardirqs last  enabled at (0): [<0000000000000000>] 0x0
[   48.755540][ T4708] hardirqs last disabled at (0): [<ffff80000819194c>] copy_process+0x129c/0x3750
[   48.758103][ T4708] softirqs last  enabled at (0): [<ffff800008191974>] copy_process+0x12c4/0x3750
[   48.760744][ T4708] softirqs last disabled at (0): [<0000000000000000>] 0x0
[   48.762718][ T4708] Preemption disabled at:
[   48.762725][ T4708] [<ffff800008452994>] cgroup_get_from_path+0x30/0x300
[   48.766068][ T4708] CPU: 0 PID: 4708 Comm: syz-executor142 Tainted: G        W         5.15.164-syzkaller #0
[   48.769056][ T4708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[   48.771939][ T4708] Call trace:
[   48.772844][ T4708]  dump_backtrace+0x0/0x530
[   48.774141][ T4708]  show_stack+0x2c/0x3c
[   48.775358][ T4708]  dump_stack_lvl+0x108/0x170
[   48.776793][ T4708]  dump_stack+0x1c/0x58
[   48.777984][ T4708]  ___might_sleep+0x380/0x4dc
[   48.779280][ T4708]  __might_sleep+0x98/0xf0
[   48.780497][ T4708]  down_read+0x34/0x398
[   48.781750][ T4708]  kernfs_walk_and_get_ns+0x8c/0x310
[   48.783300][ T4708]  cgroup_get_from_path+0x64/0x300
[   48.784812][ T4708]  cgroup_mt_check_v1+0x18c/0x278
[   48.786267][ T4708]  xt_check_match+0x338/0x914
[   48.787588][ T4708]  translate_table+0x10a0/0x1a98
[   48.789018][ T4708]  do_ipt_set_ctl+0xb8c/0x1164
[   48.790373][ T4708]  nf_setsockopt+0x270/0x290
[   48.791688][ T4708]  ip_setsockopt+0x1d70/0x32cc
[   48.793085][ T4708]  tcp_setsockopt+0x204/0x33ec
[   48.794461][ T4708]  sock_common_setsockopt+0xb0/0xcc
[   48.795946][ T4708]  __sys_setsockopt+0x3a8/0x6b4
[   48.797449][ T4708]  __arm64_sys_setsockopt+0xb8/0xd4
[   48.798922][ T4708]  invoke_syscall+0x98/0x2b8
[   48.800210][ T4708]  el0_svc_common+0x138/0x258
[   48.801619][ T4708]  do_el0_svc+0x58/0x14c
[   48.802843][ T4708]  el0_svc+0x7c/0x1f0
[   48.803905][ T4708]  el0t_64_sync_handler+0x84/0xe4
[   48.805430][ T4708]  el0t_64_sync+0x1a0/0x1a4
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[   49.745230][ T4794] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497
[   49.747919][ T4794] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4794, name: syz-executor142
[   49.750531][ T4794] INFO: lockdep is turned off.
[   49.751814][ T4794] irq event stamp: 0
[   49.753017][ T4794] hardirqs last  enabled at (0): [<0000000000000000>] 0x0
[   49.755097][ T4794] hardirqs last disabled at (0): [<ffff80000819194c>] copy_process+0x129c/0x3750
[   49.757694][ T4794] softirqs last  enabled at (0): [<ffff800008191974>] copy_process+0x12c4/0x3750
[   49.760272][ T4794] softirqs last disabled at (0): [<0000000000000000>] 0x0
[   49.762333][ T4794] Preemption disabled at:
[   49.762340][ T4794] [<ffff800008452994>] cgroup_get_from_path+0x30/0x300
[   49.765448][ T4794] CPU: 0 PID: 4794 Comm: syz-executor142 Tainted: G        W         5.15.164-syzkaller #0
[   49.768152][ T4794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[   49.770972][ T4794] Call trace:
[   49.771886][ T4794]  dump_backtrace+0x0/0x530
[   49.773259][ T4794]  show_stack+0x2c/0x3c
[   49.774430][ T4794]  dump_stack_lvl+0x108/0x170
[   49.775670][ T4794]  dump_stack+0x1c/0x58
[   49.776786][ T4794]  ___might_sleep+0x380/0x4dc
[   49.778047][ T4794]  __might_sleep+0x98/0xf0
[   49.779284][ T4794]  down_read+0x34/0x398
[   49.780436][ T4794]  kernfs_walk_and_get_ns+0x8c/0x310
[   49.781926][ T4794]  cgroup_get_from_path+0x64/0x300
[   49.783394][ T4794]  cgroup_mt_check_v1+0x18c/0x278
[   49.784795][ T4794]  xt_check_match+0x338/0x914
[   49.786054][ T4794]  translate_table+0x10a0/0x1a98
[   49.787371][ T4794]  do_ipt_set_ctl+0xb8c/0x1164
[   49.788672][ T4794]  nf_setsockopt+0x270/0x290
[   49.789980][ T4794]  ip_setsockopt+0x1d70/0x32cc
[   49.791343][ T4794]  tcp_setsockopt+0x204/0x33ec
[   49.792684][ T4794]  sock_common_setsockopt+0xb0/0xcc
[   49.794127][ T4794]  __sys_setsockopt+0x3a8/0x6b4
[   49.795437][ T4794]  __arm64_sys_setsockopt+0xb8/0xd4
[   49.796835][ T4794]  invoke_syscall+0x98/0x2b8
[   49.798048][ T4794]  el0_svc_common+0x138/0x258
[   49.799391][ T4794]  do_el0_svc+0x58/0x14c
[   49.800647][ T4794]  el0_svc+0x7c/0x1f0
[   49.801812][ T4794]  el0t_64_sync_handler+0x84/0xe4
[   49.803284][ T4794]  el0t_64_sync+0x1a0/0x1a4
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[   50.747189][ T4881] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497
[   50.749770][ T4881] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4881, name: syz-executor142
[   50.752255][ T4881] INFO: lockdep is turned off.
[   50.753558][ T4881] irq event stamp: 0
[   50.754572][ T4881] hardirqs last  enabled at (0): [<0000000000000000>] 0x0
[   50.756496][ T4881] hardirqs last disabled at (0): [<ffff80000819194c>] copy_process+0x129c/0x3750
[   50.759126][ T4881] softirqs last  enabled at (0): [<ffff800008191974>] copy_process+0x12c4/0x3750