------------[ cut here ]------------ proc_dir_entry 'can-bcm/10521' already registered WARNING: CPU: 0 PID: 7680 at fs/proc/generic.c:376 proc_register+0x2e8/0x464 fs/proc/generic.c:377 Modules linked in: CPU: 0 PID: 7680 Comm: syz-executor.4 Not tainted 6.9.0-rc3-syzkaller-gb5d2afe8745b #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : proc_register+0x2e8/0x464 fs/proc/generic.c:377 lr : proc_register+0x2e0/0x464 fs/proc/generic.c:375 sp : ffff8000a03a7a40 x29: ffff8000a03a7a60 x28: dfff800000000000 x27: 0000000000000000 x26: 0000000000000005 x25: ffff0000ec5601f8 x24: ffff0000d6a2cae4 x23: ffff0000d6a2cad8 x22: 1fffe0001ad45952 x21: ffff0000d6a2ca94 x20: ffff0000ec560224 x19: ffff0000d6a2ca00 x18: 0000000000000008 x17: 0000000000000000 x16: ffff80008adab880 x15: ffff700011dde62c x14: 1ffff00011dde62c x13: 0000000000000004 x12: ffffffffffffffff x11: 0000000000040000 x10: 0000000000001ab0 x9 : c072fe735e0eee00 x8 : c072fe735e0eee00 x7 : 0000000000000001 x6 : 0000000000000001 x5 : ffff8000a03a71b8 x4 : ffff80008ef65060 x3 : ffff80008036f978 x2 : 0000000000000000 x1 : 0000000000000001 x0 : ffff80008f1b17e0 Call trace: proc_register+0x2e8/0x464 fs/proc/generic.c:377 proc_create_net_single+0x140/0x198 fs/proc/proc_net.c:219 bcm_connect+0x224/0x43c net/can/bcm.c:1673 __sys_connect_file net/socket.c:2048 [inline] __sys_connect+0x268/0x290 net/socket.c:2065 __do_sys_connect net/socket.c:2075 [inline] __se_sys_connect net/socket.c:2072 [inline] __arm64_sys_connect+0x7c/0x94 net/socket.c:2072 __invoke_syscall arch/arm64/kernel/syscall.c:34 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:48 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:133 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:152 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 irq event stamp: 2502 hardirqs last enabled at (2501): [] __up_console_sem kernel/printk/printk.c:341 [inline] hardirqs last enabled at (2501): [] __console_unlock kernel/printk/printk.c:2731 [inline] hardirqs last enabled at (2501): [] console_unlock+0x17c/0x3d4 kernel/printk/printk.c:3050 hardirqs last disabled at (2502): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:470 softirqs last enabled at (2496): [] softirq_handle_end kernel/softirq.c:400 [inline] softirqs last enabled at (2496): [] __do_softirq+0xb10/0xd2c kernel/softirq.c:583 softirqs last disabled at (2471): [] ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:81 ---[ end trace 0000000000000000 ]--- loop4: detected capacity change from 0 to 32768 BTRFS: device fsid 395ef67a-297e-477c-816d-cd80a5b93e5d devid 1 transid 8 /dev/loop4 (7:4) scanned by syz-executor.4 (7680) BTRFS info (device loop4): first mount of filesystem 395ef67a-297e-477c-816d-cd80a5b93e5d BTRFS info (device loop4): using sha256 (sha256-ce) checksum algorithm BTRFS info (device loop4): using free-space-tree BTRFS error (device loop4): failed to load root extent BTRFS error (device loop4): open_ctree failed