c0)={0x5, 0x7ff, 0x4}) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x6c, 0x3, 0x1, 0x201, 0x0, 0x0, {0x3}, [@CTA_TUPLE_REPLY={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @CTA_SEQ_ADJ_ORIG={0x4c, 0xf, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0xe2ff}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x7}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x4}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x5}, @CTA_SEQADJ_OFFSET_BEFORE={0x8}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x2}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x35b7}, @CTA_SEQADJ_CORRECTION_POS={0x8}]}]}, 0x6c}}, 0x0) mount$bind(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000300), 0x4, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x20, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_config_ext={0x5}, 0x40400, 0x3, 0x7ee, 0x4, 0x5, 0x4, 0x0, 0x0, 0xffff, 0x0, 0x400}, 0x0, 0x6, r1, 0x3) 04:07:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000380)=']p\"\xae\x06\xc40\x1a\x1a\\\x9e\x8a\x17@)#\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004I\x1c4P\x0e\xc4!\xc9\xece\x84\x85\xf2\xdb\xd3\xa7_\xe5\x95\x04\xdae\xca\xfd\xe2\xd1\xc5\x13\xf3u\xea\xc0\xb5b[\x9adH~\n\xe1\x86\x1f\xe7s\x04\xe8\xf2$\xae\xa8\xe7\xbd\x05\xb0B\xf2\x9cp\xc73\x9db\xc4\xe8EC\xbd\xc9\xf8\x0e\xd7\x1b\x11\xaf\xbf [ 3253.999966] dump_stack_lvl+0x8b/0xc3 [ 3254.000452] print_report+0x175/0x478 [ 3254.000928] ? __lock_acquire+0x42c9/0x5e80 [ 3254.001470] kasan_report+0xbb/0x1d0 [ 3254.001951] ? __lock_acquire+0x42c9/0x5e80 [ 3254.002501] __lock_acquire+0x42c9/0x5e80 [ 3254.003029] ? mark_lock.part.0+0x0/0x2f80 [ 3254.003574] ? finish_task_switch.isra.0+0x22d/0x8b0 [ 3254.004212] ? __lock_acquire+0x0/0x5e80 [ 3254.004722] ? __switch_to+0x5bf/0xf30 [ 3254.005224] lock_acquire+0x1a2/0x540 [ 3254.005716] ? kmemleak_scan+0x1a0/0x1610 [ 3254.009810] ? lock_acquire+0x0/0x540 [ 3254.010303] ? __call_rcu_common.constprop.0+0x589/0xa50 [ 3254.010967] ? __call_rcu_common.constprop.0+0x589/0xa50 [ 3254.011628] ? lockdep_hardirqs_on+0x79/0x110 [ 3254.012208] ? _raw_spin_lock_irq+0x41/0x60 [ 3254.012755] _raw_spin_lock_irq+0x32/0x60 [ 3254.013269] ? kmemleak_scan+0x1a0/0x1610 [ 3254.013775] kmemleak_scan+0x1a0/0x1610 [ 3254.014275] ? kmemleak_scan+0x0/0x1610 [ 3254.014765] ? strncpy_from_user+0x204/0x3f0 [ 3254.015314] kmemleak_write+0x570/0x690 [ 3254.015799] ? kmemleak_write+0x0/0x690 [ 3254.016296] ? debugfs_file_get+0x1ce/0x460 [ 3254.016817] ? debugfs_file_get+0x0/0x460 [ 3254.017331] full_proxy_write+0x11d/0x1a0 [ 3254.017837] vfs_write+0x2cb/0xda0 [ 3254.018302] ? full_proxy_write+0x0/0x1a0 [ 3254.018809] ? vfs_write+0x0/0xda0 [ 3254.019266] ? lock_release+0x3b2/0x760 [ 3254.019769] ? __up_read+0x192/0x740 [ 3254.020254] ? handle_mm_fault+0x696/0x970 [ 3254.020784] ? __up_read+0x0/0x740 [ 3254.021236] ? __fget_light+0x212/0x290 [ 3254.021755] ksys_write+0x127/0x260 [ 3254.022220] ? ksys_write+0x0/0x260 [ 3254.022691] ? syscall_enter_from_user_mode+0x1d/0x60 [ 3254.023330] ? syscall_enter_from_user_mode+0x1d/0x60 [ 3254.023988] do_syscall_64+0x3b/0xa0 [ 3254.024475] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3254.025104] RIP: 0033:0x7f3fce0705c3 [ 3254.025565] Code: 16 00 00 00 eb ae 90 b8 6e 00 00 00 eb a6 e8 44 ef 04 00 0f 1f 40 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 3254.027667] RSP: 002b:00007ffd6c980828 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3254.028569] RAX: ffffffffffffffda RBX: 00007ffd6c980e68 RCX: 00007f3fce0705c3 [ 3254.029406] RDX: 0000000000000004 RSI: 00007f3fce126ed9 RDI: 0000000000000003 [ 3254.030249] RBP: 0000000000000002 R08: 0000000000000cb5 R09: 00007ffd6c9ac080 [ 3254.031083] R10: 00007ffd6c9ac090 R11: 0000000000000246 R12: 00000000fffffff6 [ 3254.031932] R13: 00007ffd6c982ef1 R14: 0000000000000000 R15: 000000000031a4b7 [ 3254.032790] [ 3254.033084] [ 3254.033298] Allocated by task 127: [ 3254.033723] kasan_save_stack+0x1e/0x50 [ 3254.034250] kasan_set_track+0x21/0x40 [ 3254.034755] __kasan_slab_alloc+0x58/0x80 [ 3254.035292] kmem_cache_alloc+0x1a9/0x3f0 [ 3254.035809] __create_object+0x3d/0xc10 [ 3254.036324] kmem_cache_alloc+0x235/0x3f0 [ 3254.036845] __alloc_file+0x21/0x250 [ 3254.037310] alloc_empty_file+0x6d/0x180 [ 3254.037805] path_openat+0xd4/0x29c0 [ 3254.038271] do_filp_open+0x1b6/0x420 [ 3254.038747] do_sys_openat2+0x171/0x4d0 [ 3254.039253] __x64_sys_openat+0x13f/0x200 [ 3254.039769] do_syscall_64+0x3b/0xa0 [ 3254.040257] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3254.040899] [ 3254.041113] Freed by task 13: [ 3254.041499] kasan_save_stack+0x1e/0x50 [ 3254.042003] kasan_set_track+0x21/0x40 [ 3254.042498] kasan_save_free_info+0x2a/0x60 [ 3254.043047] __kasan_slab_free+0x106/0x1a0 [ 3254.043581] kmem_cache_free+0xf7/0x620 [ 3254.044094] rcu_core+0x7e2/0x2090 [ 3254.044567] __do_softirq+0x1c3/0x8f5 [ 3254.045073] [ 3254.045301] Last potentially related work creation: [ 3254.045910] kasan_save_stack+0x1e/0x50 [ 3254.046424] __kasan_record_aux_stack+0x95/0xc0 [ 3254.047037] __call_rcu_common.constprop.0+0x6a/0xa50 [ 3254.047694] kmem_cache_free+0xbd/0x620 [ 3254.048216] rcu_core+0x7e2/0x2090 [ 3254.048684] __do_softirq+0x1c3/0x8f5 [ 3254.049188] [ 3254.049413] Second to last potentially related work creation: [ 3254.050123] kasan_save_stack+0x1e/0x50 [ 3254.050638] __kasan_record_aux_stack+0x95/0xc0 [ 3254.051248] __call_rcu_common.constprop.0+0x6a/0xa50 [ 3254.051922] __kmem_cache_free+0x91/0x410 [ 3254.052466] skb_release_data+0x6d8/0x820 [ 3254.052998] consume_skb+0xc2/0x170 [ 3254.053479] mac80211_hwsim_tx_frame+0x1f6/0x2b0 [ 3254.054093] mac80211_hwsim_beacon_tx+0x562/0xac0 [ 3254.054717] __iterate_interfaces+0x2d3/0x570 [ 3254.055307] ieee80211_iterate_active_interfaces_atomic+0x70/0x190 [ 3254.056123] mac80211_hwsim_beacon+0x101/0x210 [ 3254.056710] __hrtimer_run_queues+0x541/0xb60 [ 3254.057285] hrtimer_run_softirq+0x172/0x350 [ 3254.057858] __do_softirq+0x1c3/0x8f5 [ 3254.058366] [ 3254.058590] The buggy address belongs to the object at ffff888016950390 [ 3254.058590] which belongs to the cache kmemleak_object of size 240 [ 3254.060145] The buggy address is located 24 bytes inside of [ 3254.060145] 240-byte region [ffff888016950390, ffff888016950480) [ 3254.061551] [ 3254.061774] The buggy address belongs to the physical page: [ 3254.062465] page:00000000b8de51ac refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x16950 [ 3254.063602] anon flags: 0x100000000000200(slab|node=0|zone=1) [ 3254.064366] raw: 0100000000000200 ffff888007c4f780 ffffea0000615740 dead000000000005 [ 3254.065334] raw: 0000000000000000 00000000000d000d 00000001ffffffff 0000000000000000 [ 3254.066296] page dumped because: kasan: bad access detected [ 3254.066989] [ 3254.067207] Memory state around the buggy address: [ 3254.067812] ffff888016950280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3254.068716] ffff888016950300: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc [ 3254.069619] >ffff888016950380: fc fc fa fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3254.070512] ^ [ 3254.071102] ffff888016950400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3254.072016] ffff888016950480: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 3254.072903] ================================================================== [ 3254.073801] Disabling lock debugging due to kernel taint VM DIAGNOSIS: 04:11:22 Registers: info registers vcpu 0 RAX=dffffc0000000000 RBX=ffffffff81375f60 RCX=0000000000000000 RDX=1ffff1100843ef2f RSI=ffffffff817b4ff9 RDI=ffff8880421f79e8 RBP=ffff8880421f79b8 RSP=ffff8880421f7918 R8 =ffffffff85cf0bd4 R9 =ffffffff85cf0bd8 R10=ffffed100843ef31 R11=ffff8880421f7960 R12=ffff8880421f79e8 R13=0000000000000000 R14=ffff888016500000 R15=0000000000000000 RIP=ffffffff81375f6a RFL=00000286 [--S--P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f8f463518c0 00000000 00000000 GS =0000 ffff88806d000000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe130939a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe1309398000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000563fc012a7f0 CR3=000000001e8d6000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff4ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffff00ffffffffffff0000000000 XMM02=3fc017d0d00000000000006b636f6c62 XMM03=000000000f00000000000037706f6f6c XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=ffffffffffff00000000000000000000 XMM06=00000000000065616124242f6867632f XMM07=00000000000000000000000000000000 XMM08=75253a75252f73252f7665642f007261 XMM09=00000000000000000000000000000000 XMM10=00000000200000000000000020000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000036 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff82451491 RDI=ffffffff879a19e0 RBP=ffffffff879a19a0 RSP=ffff888042b2f248 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000036 R11=0000000000000001 R12=0000000000000036 R13=ffffffff879a19a0 R14=0000000000000010 R15=ffffffff82451480 RIP=ffffffff824514e9 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000555555bf9400 00000000 00000000 GS =0000 ffff88806d100000 00000000 00000000 LDT=0000 ffff888000000000 00000000 00000000 TR =0040 fffffe37c3791000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe37c378f000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f8f45a15344 CR3=00000000399bc000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff4ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=000000010000000e0000563fc0147310 XMM02=ffffff0f0e0d0c0b0a09080706050403 XMM03=696e656420737365636341002f737973 XMM04=0030323134323039323d44455a494c41 XMM05=3d4d554e51455300313d5145534b5349 XMM06=706f6f6c2f7665642f3d454d414e5645 XMM07=5f4b534944006b636f6c623d4d455453 XMM08=49006d756e203c2069000a313a56000a XMM09=00000000000000000000000000000000 XMM10=00000000200000000000000020000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000