b21ccfa68 EFLAGS: 00000206 ORIG_RAX: 0000000000000038
[ 3175.723052][T10492] RAX: ffffffffffffffda RBX: 00007f7b2276c700 RCX: 00007f7b21a8d591
[ 3175.731017][T10492] RDX: 00007f7b2276c9d0 RSI: 00007f7b2276c2f0 RDI: 00000000003d0f00
[ 3175.738978][T10492] RBP: 00007f7b21ccfcb0 R08: 00007f7b2276c700 R09: 00007f7b2276c700
05:07:16 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3175.746939][T10492] R10: 00007f7b2276c9d0 R11: 0000000000000206 R12: 00007f7b21ccfb1e
[ 3175.754917][T10492] R13: 00007f7b21ccfb1f R14: 00007f7b2276c300 R15: 0000000000022000
[ 3175.762890][T10492]
[ 3175.882156][T10492] memory: usage 307200kB, limit 307200kB, failcnt 4069
[ 3175.908910][T10492] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3175.920330][T10492] Memory cgroup stats for /syz1:
[ 3175.920476][T10492] anon 98304
[ 3175.920476][T10492] file 225280
[ 3175.920476][T10492] kernel 314249216
[ 3175.920476][T10492] kernel_stack 32768
[ 3175.920476][T10492] pagetables 73728
[ 3175.920476][T10492] sec_pagetables 0
[ 3175.920476][T10492] percpu 5433632
[ 3175.920476][T10492] sock 0
[ 3175.920476][T10492] vmalloc 8192
[ 3175.920476][T10492] shmem 225280
[ 3175.920476][T10492] zswap 0
[ 3175.920476][T10492] zswapped 0
[ 3175.920476][T10492] file_mapped 225280
[ 3175.920476][T10492] file_dirty 0
[ 3175.920476][T10492] file_writeback 0
[ 3175.920476][T10492] swapcached 0
[ 3175.920476][T10492] anon_thp 0
[ 3175.920476][T10492] file_thp 0
[ 3175.920476][T10492] shmem_thp 0
[ 3175.920476][T10492] inactive_anon 0
[ 3175.920476][T10492] active_anon 323584
[ 3175.920476][T10492] inactive_file 0
[ 3175.920476][T10492] active_file 0
[ 3175.920476][T10492] unevictable 0
[ 3175.920476][T10492] slab_reclaimable 53824
[ 3175.920476][T10492] slab_unreclaimable 308583824
[ 3175.920476][T10492] slab 308637648
[ 3175.920476][T10492] workingset_refault_anon 0
[ 3175.920476][T10492] workingset_refault_file 0
[ 3175.920476][T10492] workingset_activate_anon 0
[ 3175.920476][T10492] workingset_activate_file 0
[ 3175.920476][T10492] workingset_restore_anon 0
[ 3175.920476][T10492] workingset_restore_file 0
[ 3175.920476][T10492] workingset_nodereclaim 0
[ 3175.920476][T10492] pgscan 0
[ 3175.920476][T10492] pgsteal 0
[ 3175.920476][T10492] pgscan_kswapd 0
[ 3175.920476][T10492] pgscan_direct 0
[ 3175.920476][T10492] pgscan_khugepaged 0
[ 3175.920476][T10492] pgsteal_kswapd 0
[ 3175.920476][T10492] pgsteal_direct 0
[ 3175.920476][T10492] pgsteal_khugepaged 0
[ 3175.920476][T10492] pgfault 645884
[ 3175.920476][T10492] pgmajfault 0
[ 3175.920476][T10492] pgrefill 0
[ 3175.920476][T10492] pgactivate 0
[ 3175.920476][T10492] pgdeactivate 783
[ 3175.920476][T10492] pglazyfree 0
[ 3175.920476][T10492] pglazyfreed 0
[ 3175.920476][T10492] zswpin 0
[ 3175.920476][T10492] zswpout 0
[ 3175.920476][T10492] thp_fault_alloc 0
05:07:16 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:16 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:17 executing program 3:
open(0x0, 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:17 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3177.510808][T10492] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=10492,uid=0
[ 3177.658723][T10492] Memory cgroup out of memory: Killed process 10492 (syz-executor.1) total-vm:54548kB, anon-rss:384kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000
05:07:18 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:18 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:18 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0)
05:07:18 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:19 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3178.773411][T10519] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000
[ 3178.868057][T10519] CPU: 0 PID: 10519 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3178.876782][T10519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3178.886853][T10519] Call Trace:
[ 3178.890125][T10519]
[ 3178.893050][T10519] dump_stack_lvl+0x136/0x150
[ 3178.897724][T10519] dump_header+0x10a/0xd70
[ 3178.902139][T10519] oom_kill_process+0x25d/0x600
[ 3178.907008][T10519] out_of_memory+0x35c/0x1660
[ 3178.911696][T10519] ? find_held_lock+0x2d/0x110
[ 3178.916489][T10519] ? oom_killer_disable+0x2b0/0x2b0
[ 3178.921695][T10519] ? rcu_read_unlock+0x9/0x60
[ 3178.926401][T10519] ? find_held_lock+0x2d/0x110
[ 3178.931176][T10519] mem_cgroup_out_of_memory+0x206/0x270
[ 3178.936755][T10519] ? mem_cgroup_margin+0x130/0x130
[ 3178.941863][T10519] ? lock_downgrade+0x690/0x690
[ 3178.946717][T10519] try_charge_memcg+0xf9b/0x13b0
[ 3178.951654][T10519] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3178.957656][T10519] ? get_mem_cgroup_from_objcg+0xa1/0x280
[ 3178.963375][T10519] ? lock_downgrade+0x690/0x690
[ 3178.968220][T10519] ? lock_downgrade+0x690/0x690
[ 3178.973070][T10519] __memcg_kmem_charge_page+0x16e/0x3c0
[ 3178.978617][T10519] memcg_charge_kernel_stack.part.0+0x6c/0x150
[ 3178.984767][T10519] copy_process+0x4e3/0x7590
[ 3178.989353][T10519] ? __lock_acquire+0xbc5/0x5d40
[ 3178.994290][T10519] ? __cleanup_sighand+0xb0/0xb0
[ 3178.999239][T10519] ? lockdep_hardirqs_on_prepare+0x410/0x410
[ 3179.005214][T10519] ? psi_memstall_leave+0x174/0x250
[ 3179.010413][T10519] ? lock_downgrade+0x690/0x690
[ 3179.015261][T10519] kernel_clone+0xeb/0x890
[ 3179.019678][T10519] ? create_io_thread+0xf0/0xf0
[ 3179.024527][T10519] ? percpu_ref_put_many.constprop.0+0x6a/0x1b0
[ 3179.030764][T10519] ? lock_downgrade+0x690/0x690
[ 3179.035635][T10519] __do_sys_clone+0xba/0x100
[ 3179.040219][T10519] ? kernel_clone+0x890/0x890
[ 3179.044898][T10519] ? syscall_enter_from_user_mode+0x26/0x80
[ 3179.050790][T10519] do_syscall_64+0x39/0xb0
[ 3179.055205][T10519] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 3179.061093][T10519] RIP: 0033:0x7f7b21a8d591
[ 3179.065501][T10519] Code: 48 85 ff 74 3d 48 85 f6 74 38 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 7c 13 74 01 c3 31 ed 58 5f ff d0 48 89 c7 b8 3c 00 00 00
[ 3179.085101][T10519] RSP: 002b:00007f7b21ccfa68 EFLAGS: 00000206 ORIG_RAX: 0000000000000038
[ 3179.093503][T10519] RAX: ffffffffffffffda RBX: 00007f7b2276c700 RCX: 00007f7b21a8d591
[ 3179.101478][T10519] RDX: 00007f7b2276c9d0 RSI: 00007f7b2276c2f0 RDI: 00000000003d0f00
[ 3179.109438][T10519] RBP: 00007f7b21ccfcb0 R08: 00007f7b2276c700 R09: 00007f7b2276c700
[ 3179.117418][T10519] R10: 00007f7b2276c9d0 R11: 0000000000000206 R12: 00007f7b21ccfb1e
[ 3179.125403][T10519] R13: 00007f7b21ccfb1f R14: 00007f7b2276c300 R15: 0000000000022000
[ 3179.133376][T10519]
[ 3179.158660][ C0] net_ratelimit: 2020 callbacks suppressed
[ 3179.158671][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3179.177273][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3179.189456][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3179.201709][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3179.213928][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3179.226624][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3179.238820][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3179.251073][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3179.263195][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3179.275879][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
05:07:19 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3179.368892][T10519] memory: usage 307156kB, limit 307200kB, failcnt 4164
[ 3179.433125][T10519] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3179.475604][T10519] Memory cgroup stats for /syz1:
[ 3179.475848][T10519] anon 98304
[ 3179.475848][T10519] file 225280
[ 3179.475848][T10519] kernel 314200064
[ 3179.475848][T10519] kernel_stack 32768
[ 3179.475848][T10519] pagetables 73728
[ 3179.475848][T10519] sec_pagetables 0
[ 3179.475848][T10519] percpu 5433568
[ 3179.475848][T10519] sock 0
[ 3179.475848][T10519] vmalloc 8192
[ 3179.475848][T10519] shmem 225280
[ 3179.475848][T10519] zswap 0
[ 3179.475848][T10519] zswapped 0
[ 3179.475848][T10519] file_mapped 225280
[ 3179.475848][T10519] file_dirty 0
[ 3179.475848][T10519] file_writeback 0
[ 3179.475848][T10519] swapcached 0
[ 3179.475848][T10519] anon_thp 0
[ 3179.475848][T10519] file_thp 0
[ 3179.475848][T10519] shmem_thp 0
[ 3179.475848][T10519] inactive_anon 0
[ 3179.475848][T10519] active_anon 323584
[ 3179.475848][T10519] inactive_file 0
[ 3179.475848][T10519] active_file 0
[ 3179.475848][T10519] unevictable 0
[ 3179.475848][T10519] slab_reclaimable 44912
[ 3179.475848][T10519] slab_unreclaimable 308537744
[ 3179.475848][T10519] slab 308582656
[ 3179.475848][T10519] workingset_refault_anon 0
[ 3179.475848][T10519] workingset_refault_file 0
[ 3179.475848][T10519] workingset_activate_anon 0
[ 3179.475848][T10519] workingset_activate_file 0
[ 3179.475848][T10519] workingset_restore_anon 0
[ 3179.475848][T10519] workingset_restore_file 0
[ 3179.475848][T10519] workingset_nodereclaim 0
[ 3179.475848][T10519] pgscan 0
[ 3179.475848][T10519] pgsteal 0
[ 3179.475848][T10519] pgscan_kswapd 0
[ 3179.475848][T10519] pgscan_direct 0
[ 3179.475848][T10519] pgscan_khugepaged 0
[ 3179.475848][T10519] pgsteal_kswapd 0
[ 3179.475848][T10519] pgsteal_direct 0
05:07:20 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3179.475848][T10519] pgsteal_khugepaged 0
[ 3179.475848][T10519] pgfault 645919
[ 3179.475848][T10519] pgmajfault 0
[ 3179.475848][T10519] pgrefill 0
[ 3179.475848][T10519] pgactivate 0
[ 3179.475848][T10519] pgdeactivate 783
[ 3179.475848][T10519] pglazyfree 0
[ 3179.475848][T10519] pglazyfreed 0
[ 3179.475848][T10519] zswpin 0
[ 3179.475848][T10519] zswpout 0
[ 3179.475848][T10519] thp_fault_alloc 0
05:07:20 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:20 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:20 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:21 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:21 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3181.086015][T10519] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=10519,uid=0
[ 3181.228808][T10519] Memory cgroup out of memory: Killed process 10519 (syz-executor.1) total-vm:54548kB, anon-rss:384kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000
05:07:21 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:21 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}, 0x1, 0x0, 0x0, 0xffffff9e}, 0x0)
05:07:22 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3181.970373][T10558] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000
05:07:22 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3182.249016][T10558] CPU: 1 PID: 10558 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3182.257755][T10558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3182.267803][T10558] Call Trace:
[ 3182.271088][T10558]
[ 3182.274014][T10558] dump_stack_lvl+0x136/0x150
[ 3182.278690][T10558] dump_header+0x10a/0xd70
[ 3182.283118][T10558] oom_kill_process+0x25d/0x600
[ 3182.287996][T10558] out_of_memory+0x35c/0x1660
[ 3182.292700][T10558] ? find_held_lock+0x2d/0x110
[ 3182.297469][T10558] ? oom_killer_disable+0x2b0/0x2b0
[ 3182.302664][T10558] ? rcu_read_unlock+0x9/0x60
[ 3182.307338][T10558] ? find_held_lock+0x2d/0x110
[ 3182.312106][T10558] mem_cgroup_out_of_memory+0x206/0x270
[ 3182.317653][T10558] ? mem_cgroup_margin+0x130/0x130
[ 3182.322762][T10558] ? lock_downgrade+0x690/0x690
[ 3182.327633][T10558] try_charge_memcg+0xf9b/0x13b0
[ 3182.332571][T10558] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3182.338555][T10558] ? get_mem_cgroup_from_objcg+0xa1/0x280
[ 3182.344301][T10558] ? lock_downgrade+0x690/0x690
[ 3182.349152][T10558] ? lock_downgrade+0x690/0x690
[ 3182.354003][T10558] obj_cgroup_charge+0x2af/0x5e0
[ 3182.358936][T10558] ? sock_alloc_inode+0x27/0x1d0
[ 3182.363868][T10558] kmem_cache_alloc_lru+0x142/0x600
[ 3182.369072][T10558] sock_alloc_inode+0x27/0x1d0
[ 3182.373853][T10558] ? sock_free_inode+0x30/0x30
[ 3182.378618][T10558] alloc_inode+0x61/0x230
[ 3182.382965][T10558] new_inode_pseudo+0x17/0x80
[ 3182.387640][T10558] sock_alloc+0x40/0x270
[ 3182.391881][T10558] __sock_create+0xbd/0x850
[ 3182.396396][T10558] ? xfd_validate_state+0x5d/0x180
[ 3182.401504][T10558] __sys_socket+0x133/0x250
[ 3182.406006][T10558] ? __sys_socket_file+0x1d0/0x1d0
[ 3182.411121][T10558] __x64_sys_socket+0x73/0xb0
[ 3182.415796][T10558] do_syscall_64+0x39/0xb0
[ 3182.420229][T10558] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 3182.426119][T10558] RIP: 0033:0x7f7b21a8c169
[ 3182.430539][T10558] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 3182.450142][T10558] RSP: 002b:00007f7b2276c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000029
[ 3182.458557][T10558] RAX: ffffffffffffffda RBX: 00007f7b21babf80 RCX: 00007f7b21a8c169
[ 3182.466535][T10558] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000010
[ 3182.474499][T10558] RBP: 00007f7b21ae7ca1 R08: 0000000000000000 R09: 0000000000000000
[ 3182.482462][T10558] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 3182.490423][T10558] R13: 00007f7b21ccfb1f R14: 00007f7b2276c300 R15: 0000000000022000
[ 3182.498395][T10558]
05:07:23 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
05:07:23 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:23 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3182.994245][T10558] memory: usage 307200kB, limit 307200kB, failcnt 4271
[ 3183.001213][T10558] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3183.031092][T10558] Memory cgroup stats for /syz1:
[ 3183.031318][T10558] anon 106496
[ 3183.031318][T10558] file 225280
[ 3183.031318][T10558] kernel 314241024
[ 3183.031318][T10558] kernel_stack 65536
[ 3183.031318][T10558] pagetables 73728
[ 3183.031318][T10558] sec_pagetables 0
[ 3183.031318][T10558] percpu 5433632
[ 3183.031318][T10558] sock 0
[ 3183.031318][T10558] vmalloc 8192
[ 3183.031318][T10558] shmem 225280
[ 3183.031318][T10558] zswap 0
[ 3183.031318][T10558] zswapped 0
[ 3183.031318][T10558] file_mapped 225280
[ 3183.031318][T10558] file_dirty 0
[ 3183.031318][T10558] file_writeback 0
[ 3183.031318][T10558] swapcached 0
[ 3183.031318][T10558] anon_thp 0
[ 3183.031318][T10558] file_thp 0
[ 3183.031318][T10558] shmem_thp 0
[ 3183.031318][T10558] inactive_anon 0
[ 3183.031318][T10558] active_anon 331776
[ 3183.031318][T10558] inactive_file 0
[ 3183.031318][T10558] active_file 0
[ 3183.031318][T10558] unevictable 0
[ 3183.031318][T10558] slab_reclaimable 52280
[ 3183.031318][T10558] slab_unreclaimable 308559176
[ 3183.031318][T10558] slab 308611456
[ 3183.031318][T10558] workingset_refault_anon 0
[ 3183.031318][T10558] workingset_refault_file 0
[ 3183.031318][T10558] workingset_activate_anon 0
[ 3183.031318][T10558] workingset_activate_file 0
[ 3183.031318][T10558] workingset_restore_anon 0
[ 3183.031318][T10558] workingset_restore_file 0
[ 3183.031318][T10558] workingset_nodereclaim 0
[ 3183.031318][T10558] pgscan 0
[ 3183.031318][T10558] pgsteal 0
[ 3183.031318][T10558] pgscan_kswapd 0
[ 3183.031318][T10558] pgscan_direct 0
[ 3183.031318][T10558] pgscan_khugepaged 0
[ 3183.031318][T10558] pgsteal_kswapd 0
[ 3183.031318][T10558] pgsteal_direct 0
[ 3183.031318][T10558] pgsteal_khugepaged 0
[ 3183.031318][T10558] pgfault 645960
[ 3183.031318][T10558] pgmajfault 0
[ 3183.031318][T10558] pgrefill 0
[ 3183.031318][T10558] pgactivate 0
[ 3183.031318][T10558] pgdeactivate 783
[ 3183.031318][T10558] pglazyfree 0
[ 3183.031318][T10558] pglazyfreed 0
[ 3183.031318][T10558] zswpin 0
[ 3183.031318][T10558] zswpout 0
[ 3183.031318][T10558] thp_fault_alloc 0
05:07:23 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
r3 = socket$unix(0x1, 0x0, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
r5 = socket$can_bcm(0x1d, 0x2, 0x2)
connect$can_bcm(r5, 0x0, 0x0)
sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r4, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0, 0x20000600}}, 0x0)
r6 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r6, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2={0xfc, 0x2, '\x00', 0x1}, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x0, 0x80}, {0x0, 0x0, 0x10000, 0x5}, 0x0, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r7 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r7, 0x208200)
sendfile(r6, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
syz_emit_ethernet(0x0, 0x0, 0x0)
05:07:24 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3184.186281][ C1] net_ratelimit: 2007 callbacks suppressed
[ 3184.186301][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3184.204316][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3184.216849][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3184.229132][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3184.241700][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3184.253830][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3184.266316][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3184.278470][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3184.290977][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3184.303104][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
05:07:24 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:25 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3184.871206][T10558] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=10556,uid=0
[ 3184.981619][T10558] Memory cgroup out of memory: Killed process 10558 (syz-executor.1) total-vm:54548kB, anon-rss:384kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000
05:07:25 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:25 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
05:07:26 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}, 0x1, 0x0, 0x0, 0xffffffa1}, 0x0)
05:07:26 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:26 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
r3 = socket$unix(0x1, 0x0, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
r5 = socket$can_bcm(0x1d, 0x2, 0x2)
connect$can_bcm(r5, 0x0, 0x0)
sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r4, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0, 0x20000600}}, 0x0)
r6 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r6, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2={0xfc, 0x2, '\x00', 0x1}, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x0, 0x80}, {0x0, 0x0, 0x10000, 0x5}, 0x0, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r7 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r7, 0x208200)
sendfile(r6, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
syz_emit_ethernet(0x0, 0x0, 0x0)
05:07:26 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3186.274509][T10603] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000
[ 3186.394390][T10603] CPU: 0 PID: 10603 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3186.403155][T10603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3186.413221][T10603] Call Trace:
[ 3186.416497][T10603]
[ 3186.419425][T10603] dump_stack_lvl+0x136/0x150
[ 3186.424105][T10603] dump_header+0x10a/0xd70
[ 3186.428526][T10603] oom_kill_process+0x25d/0x600
[ 3186.433384][T10603] out_of_memory+0x35c/0x1660
[ 3186.438084][T10603] ? find_held_lock+0x2d/0x110
[ 3186.442861][T10603] ? oom_killer_disable+0x2b0/0x2b0
[ 3186.448070][T10603] ? rcu_read_unlock+0x9/0x60
[ 3186.452754][T10603] ? find_held_lock+0x2d/0x110
[ 3186.457521][T10603] mem_cgroup_out_of_memory+0x206/0x270
[ 3186.463064][T10603] ? mem_cgroup_margin+0x130/0x130
[ 3186.468174][T10603] ? lock_downgrade+0x690/0x690
[ 3186.473025][T10603] try_charge_memcg+0xf9b/0x13b0
[ 3186.477959][T10603] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3186.483931][T10603] ? get_mem_cgroup_from_objcg+0xa1/0x280
[ 3186.489650][T10603] ? lock_downgrade+0x690/0x690
[ 3186.494494][T10603] ? lock_downgrade+0x690/0x690
[ 3186.499345][T10603] __memcg_kmem_charge_page+0x16e/0x3c0
[ 3186.504882][T10603] memcg_charge_kernel_stack.part.0+0x6c/0x150
[ 3186.511033][T10603] copy_process+0x13a7/0x7590
[ 3186.515707][T10603] ? __lock_acquire+0xbc5/0x5d40
[ 3186.520641][T10603] ? __cleanup_sighand+0xb0/0xb0
[ 3186.525573][T10603] ? lockdep_hardirqs_on_prepare+0x410/0x410
[ 3186.531556][T10603] ? psi_memstall_leave+0x174/0x250
[ 3186.536748][T10603] ? lock_downgrade+0x690/0x690
[ 3186.541596][T10603] kernel_clone+0xeb/0x890
[ 3186.546006][T10603] ? create_io_thread+0xf0/0xf0
[ 3186.550852][T10603] ? percpu_ref_put_many.constprop.0+0x6a/0x1b0
[ 3186.557090][T10603] ? lock_downgrade+0x690/0x690
[ 3186.561939][T10603] __do_sys_clone+0xba/0x100
[ 3186.566542][T10603] ? kernel_clone+0x890/0x890
[ 3186.571239][T10603] ? syscall_enter_from_user_mode+0x26/0x80
[ 3186.577130][T10603] do_syscall_64+0x39/0xb0
[ 3186.581561][T10603] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 3186.587477][T10603] RIP: 0033:0x7f7b21a8d591
[ 3186.591886][T10603] Code: 48 85 ff 74 3d 48 85 f6 74 38 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 7c 13 74 01 c3 31 ed 58 5f ff d0 48 89 c7 b8 3c 00 00 00
[ 3186.611482][T10603] RSP: 002b:00007f7b21ccfa68 EFLAGS: 00000206 ORIG_RAX: 0000000000000038
[ 3186.619883][T10603] RAX: ffffffffffffffda RBX: 00007f7b2276c700 RCX: 00007f7b21a8d591
[ 3186.627842][T10603] RDX: 00007f7b2276c9d0 RSI: 00007f7b2276c2f0 RDI: 00000000003d0f00
[ 3186.635802][T10603] RBP: 00007f7b21ccfcb0 R08: 00007f7b2276c700 R09: 00007f7b2276c700
[ 3186.643765][T10603] R10: 00007f7b2276c9d0 R11: 0000000000000206 R12: 00007f7b21ccfb1e
[ 3186.651724][T10603] R13: 00007f7b21ccfb1f R14: 00007f7b2276c300 R15: 0000000000022000
[ 3186.659714][T10603]
05:07:27 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:27 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
05:07:27 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:27 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
r3 = socket$unix(0x1, 0x0, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
r4 = socket$can_bcm(0x1d, 0x2, 0x2)
connect$can_bcm(r4, 0x0, 0x0)
r5 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r5, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2={0xfc, 0x2, '\x00', 0x1}, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x200, 0x3ff, 0x0, 0x0, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r6 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r6, 0x208200)
sendfile(r5, r1, 0x0, 0x800100020013)
syz_emit_ethernet(0x0, 0x0, 0x0)
05:07:28 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
r3 = socket$unix(0x1, 0x0, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
r5 = socket$can_bcm(0x1d, 0x2, 0x2)
connect$can_bcm(r5, 0x0, 0x0)
sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r4, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0, 0x20000600}}, 0x0)
r6 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r6, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2={0xfc, 0x2, '\x00', 0x1}, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x0, 0x80}, {0x0, 0x0, 0x10000, 0x5}, 0x0, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r7 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r7, 0x208200)
sendfile(r6, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
syz_emit_ethernet(0x0, 0x0, 0x0)
[ 3188.086413][T10603] memory: usage 307156kB, limit 307200kB, failcnt 4378
[ 3188.098504][T10603] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3188.179382][T10603] Memory cgroup stats for /syz1:
[ 3188.180204][T10603] anon 98304
[ 3188.180204][T10603] file 225280
[ 3188.180204][T10603] kernel 314204160
[ 3188.180204][T10603] kernel_stack 32768
[ 3188.180204][T10603] pagetables 73728
[ 3188.180204][T10603] sec_pagetables 0
[ 3188.180204][T10603] percpu 5433632
[ 3188.180204][T10603] sock 0
[ 3188.180204][T10603] vmalloc 8192
[ 3188.180204][T10603] shmem 225280
[ 3188.180204][T10603] zswap 0
[ 3188.180204][T10603] zswapped 0
[ 3188.180204][T10603] file_mapped 225280
[ 3188.180204][T10603] file_dirty 0
[ 3188.180204][T10603] file_writeback 0
[ 3188.180204][T10603] swapcached 0
[ 3188.180204][T10603] anon_thp 0
[ 3188.180204][T10603] file_thp 0
[ 3188.180204][T10603] shmem_thp 0
[ 3188.180204][T10603] inactive_anon 0
[ 3188.180204][T10603] active_anon 323584
[ 3188.180204][T10603] inactive_file 0
[ 3188.180204][T10603] active_file 0
[ 3188.180204][T10603] unevictable 0
[ 3188.180204][T10603] slab_reclaimable 41824
[ 3188.180204][T10603] slab_unreclaimable 308538920
[ 3188.180204][T10603] slab 308580744
[ 3188.180204][T10603] workingset_refault_anon 0
[ 3188.180204][T10603] workingset_refault_file 0
[ 3188.180204][T10603] workingset_activate_anon 0
[ 3188.180204][T10603] workingset_activate_file 0
[ 3188.180204][T10603] workingset_restore_anon 0
[ 3188.180204][T10603] workingset_restore_file 0
[ 3188.180204][T10603] workingset_nodereclaim 0
[ 3188.180204][T10603] pgscan 0
[ 3188.180204][T10603] pgsteal 0
[ 3188.180204][T10603] pgscan_kswapd 0
[ 3188.180204][T10603] pgscan_direct 0
[ 3188.180204][T10603] pgscan_khugepaged 0
[ 3188.180204][T10603] pgsteal_kswapd 0
[ 3188.180204][T10603] pgsteal_direct 0
05:07:28 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
r3 = socket$unix(0x1, 0x0, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
r5 = socket$can_bcm(0x1d, 0x2, 0x2)
connect$can_bcm(r5, 0x0, 0x0)
sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r4, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0, 0x20000600}}, 0x0)
r6 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r6, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2={0xfc, 0x2, '\x00', 0x1}, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x0, 0x80}, {0x0, 0x0, 0x10000, 0x5}, 0x0, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r7 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r7, 0x208200)
sendfile(r6, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
syz_emit_ethernet(0x0, 0x0, 0x0)
[ 3188.180204][T10603] pgsteal_khugepaged 0
[ 3188.180204][T10603] pgfault 645998
[ 3188.180204][T10603] pgmajfault 0
[ 3188.180204][T10603] pgrefill 0
[ 3188.180204][T10603] pgactivate 0
[ 3188.180204][T10603] pgdeactivate 783
[ 3188.180204][T10603] pglazyfree 0
[ 3188.180204][T10603] pglazyfreed 0
[ 3188.180204][T10603] zswpin 0
[ 3188.180204][T10603] zswpout 0
[ 3188.180204][T10603] thp_fault_alloc 0
05:07:29 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
getpid()
process_vm_readv(0x0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, r0, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:29 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3189.056146][T10603] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=10603,uid=0
[ 3189.180834][T10603] Memory cgroup out of memory: Killed process 10603 (syz-executor.1) total-vm:54548kB, anon-rss:384kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000
[ 3189.220796][ C0] net_ratelimit: 2168 callbacks suppressed
[ 3189.220809][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3189.238861][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3189.251006][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3189.263098][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3189.275971][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3189.288170][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3189.300305][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3189.312380][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3189.328945][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3189.341145][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
05:07:29 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}, 0x1, 0x0, 0x0, 0xffffffc3}, 0x0)
05:07:29 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:29 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
getpid()
process_vm_readv(0x0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, r0, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:29 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
creat(&(0x7f0000000380)='./bus\x00', 0x0)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:29 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3189.637862][T10644] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000
[ 3189.669922][T10644] CPU: 1 PID: 10644 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3189.678650][T10644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3189.688707][T10644] Call Trace:
[ 3189.691995][T10644]
[ 3189.694925][T10644] dump_stack_lvl+0x136/0x150
[ 3189.699599][T10644] dump_header+0x10a/0xd70
[ 3189.704017][T10644] oom_kill_process+0x25d/0x600
[ 3189.708867][T10644] out_of_memory+0x35c/0x1660
[ 3189.713546][T10644] ? find_held_lock+0x2d/0x110
[ 3189.718310][T10644] ? oom_killer_disable+0x2b0/0x2b0
[ 3189.723510][T10644] ? rcu_read_unlock+0x9/0x60
[ 3189.728185][T10644] ? find_held_lock+0x2d/0x110
[ 3189.732952][T10644] mem_cgroup_out_of_memory+0x206/0x270
[ 3189.738496][T10644] ? mem_cgroup_margin+0x130/0x130
[ 3189.743602][T10644] ? lock_downgrade+0x690/0x690
[ 3189.748455][T10644] try_charge_memcg+0xf9b/0x13b0
[ 3189.753387][T10644] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3189.759362][T10644] ? get_mem_cgroup_from_objcg+0xa1/0x280
[ 3189.765081][T10644] ? lock_downgrade+0x690/0x690
[ 3189.769927][T10644] ? lock_downgrade+0x690/0x690
[ 3189.774794][T10644] __memcg_kmem_charge_page+0x16e/0x3c0
[ 3189.780371][T10644] memcg_charge_kernel_stack.part.0+0x6c/0x150
[ 3189.786575][T10644] copy_process+0x4e3/0x7590
[ 3189.791161][T10644] ? __lock_acquire+0xbc5/0x5d40
[ 3189.796096][T10644] ? __cleanup_sighand+0xb0/0xb0
[ 3189.801025][T10644] ? lockdep_hardirqs_on_prepare+0x410/0x410
[ 3189.807009][T10644] ? psi_memstall_leave+0x174/0x250
[ 3189.812210][T10644] ? lock_downgrade+0x690/0x690
[ 3189.817062][T10644] kernel_clone+0xeb/0x890
[ 3189.821480][T10644] ? create_io_thread+0xf0/0xf0
[ 3189.826331][T10644] ? percpu_ref_put_many.constprop.0+0x6a/0x1b0
[ 3189.832578][T10644] ? lock_downgrade+0x690/0x690
[ 3189.837433][T10644] __do_sys_clone+0xba/0x100
[ 3189.842026][T10644] ? kernel_clone+0x890/0x890
[ 3189.846704][T10644] ? syscall_enter_from_user_mode+0x26/0x80
[ 3189.852599][T10644] do_syscall_64+0x39/0xb0
[ 3189.857021][T10644] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 3189.862914][T10644] RIP: 0033:0x7f7b21a8d591
[ 3189.867329][T10644] Code: 48 85 ff 74 3d 48 85 f6 74 38 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 7c 13 74 01 c3 31 ed 58 5f ff d0 48 89 c7 b8 3c 00 00 00
[ 3189.886947][T10644] RSP: 002b:00007f7b21ccfa68 EFLAGS: 00000206 ORIG_RAX: 0000000000000038
[ 3189.895350][T10644] RAX: ffffffffffffffda RBX: 00007f7b2276c700 RCX: 00007f7b21a8d591
[ 3189.903312][T10644] RDX: 00007f7b2276c9d0 RSI: 00007f7b2276c2f0 RDI: 00000000003d0f00
[ 3189.911272][T10644] RBP: 00007f7b21ccfcb0 R08: 00007f7b2276c700 R09: 00007f7b2276c700
[ 3189.919233][T10644] R10: 00007f7b2276c9d0 R11: 0000000000000206 R12: 00007f7b21ccfb1e
[ 3189.927195][T10644] R13: 00007f7b21ccfb1f R14: 00007f7b2276c300 R15: 0000000000022000
[ 3189.935179][T10644]
05:07:30 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
getpid()
process_vm_readv(0x0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, r0, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:30 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x0, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:30 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, 0x0, 0x0, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:31 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, 0x0, 0x0, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:31 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
creat(&(0x7f0000000380)='./bus\x00', 0x0)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3190.892325][T10644] memory: usage 307160kB, limit 307200kB, failcnt 4437
[ 3190.900579][T10644] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3190.959692][T10644] Memory cgroup stats for /syz1:
[ 3191.001536][T10644] anon 98304
[ 3191.001536][T10644] file 225280
[ 3191.001536][T10644] kernel 314208256
[ 3191.001536][T10644] kernel_stack 32768
[ 3191.001536][T10644] pagetables 73728
[ 3191.001536][T10644] sec_pagetables 0
[ 3191.001536][T10644] percpu 5433632
[ 3191.001536][T10644] sock 0
[ 3191.001536][T10644] vmalloc 8192
[ 3191.001536][T10644] shmem 225280
[ 3191.001536][T10644] zswap 0
[ 3191.001536][T10644] zswapped 0
[ 3191.001536][T10644] file_mapped 225280
[ 3191.001536][T10644] file_dirty 0
[ 3191.001536][T10644] file_writeback 0
[ 3191.001536][T10644] swapcached 0
[ 3191.001536][T10644] anon_thp 0
[ 3191.001536][T10644] file_thp 0
[ 3191.001536][T10644] shmem_thp 0
[ 3191.001536][T10644] inactive_anon 0
[ 3191.001536][T10644] active_anon 323584
[ 3191.001536][T10644] inactive_file 0
[ 3191.001536][T10644] active_file 0
[ 3191.001536][T10644] unevictable 0
[ 3191.001536][T10644] slab_reclaimable 42208
[ 3191.001536][T10644] slab_unreclaimable 308547736
[ 3191.001536][T10644] slab 308589944
[ 3191.001536][T10644] workingset_refault_anon 0
[ 3191.001536][T10644] workingset_refault_file 0
[ 3191.001536][T10644] workingset_activate_anon 0
[ 3191.001536][T10644] workingset_activate_file 0
[ 3191.001536][T10644] workingset_restore_anon 0
[ 3191.001536][T10644] workingset_restore_file 0
[ 3191.001536][T10644] workingset_nodereclaim 0
[ 3191.001536][T10644] pgscan 0
[ 3191.001536][T10644] pgsteal 0
[ 3191.001536][T10644] pgscan_kswapd 0
[ 3191.001536][T10644] pgscan_direct 0
[ 3191.001536][T10644] pgscan_khugepaged 0
[ 3191.001536][T10644] pgsteal_kswapd 0
[ 3191.001536][T10644] pgsteal_direct 0
05:07:31 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3191.001536][T10644] pgsteal_khugepaged 0
[ 3191.001536][T10644] pgfault 646036
[ 3191.001536][T10644] pgmajfault 0
[ 3191.001536][T10644] pgrefill 0
[ 3191.001536][T10644] pgactivate 0
[ 3191.001536][T10644] pgdeactivate 783
[ 3191.001536][T10644] pglazyfree 0
[ 3191.001536][T10644] pglazyfreed 0
[ 3191.001536][T10644] zswpin 0
[ 3191.001536][T10644] zswpout 0
[ 3191.001536][T10644] thp_fault_alloc 0
05:07:31 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3191.764871][T10644] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=10644,uid=0
[ 3191.958353][T10644] Memory cgroup out of memory: Killed process 10644 (syz-executor.1) total-vm:54548kB, anon-rss:384kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000
05:07:32 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x0, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:32 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}, 0x1, 0x0, 0x0, 0xffffffe4}, 0x0)
05:07:32 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
creat(&(0x7f0000000380)='./bus\x00', 0x0)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:32 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:32 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, 0x0, 0x0, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3192.446372][T10691] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000
[ 3192.501052][T10691] CPU: 0 PID: 10691 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3192.509758][T10691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3192.519826][T10691] Call Trace:
[ 3192.523116][T10691]
[ 3192.526055][T10691] dump_stack_lvl+0x136/0x150
[ 3192.530732][T10691] dump_header+0x10a/0xd70
[ 3192.535156][T10691] oom_kill_process+0x25d/0x600
[ 3192.540009][T10691] out_of_memory+0x35c/0x1660
[ 3192.544824][T10691] ? find_held_lock+0x2d/0x110
[ 3192.549604][T10691] ? oom_killer_disable+0x2b0/0x2b0
[ 3192.554809][T10691] ? rcu_read_unlock+0x9/0x60
[ 3192.559487][T10691] ? find_held_lock+0x2d/0x110
[ 3192.564266][T10691] mem_cgroup_out_of_memory+0x206/0x270
[ 3192.569853][T10691] ? mem_cgroup_margin+0x130/0x130
[ 3192.574966][T10691] ? lock_downgrade+0x690/0x690
[ 3192.579829][T10691] try_charge_memcg+0xf9b/0x13b0
[ 3192.584769][T10691] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3192.590742][T10691] ? get_mem_cgroup_from_objcg+0xa1/0x280
[ 3192.596466][T10691] ? lock_downgrade+0x690/0x690
[ 3192.601313][T10691] ? lock_downgrade+0x690/0x690
[ 3192.606165][T10691] __memcg_kmem_charge_page+0x16e/0x3c0
[ 3192.611708][T10691] memcg_charge_kernel_stack.part.0+0x6c/0x150
[ 3192.617871][T10691] copy_process+0x13a7/0x7590
[ 3192.622572][T10691] ? __lock_acquire+0xbc5/0x5d40
[ 3192.627526][T10691] ? __cleanup_sighand+0xb0/0xb0
[ 3192.632509][T10691] ? lockdep_hardirqs_on_prepare+0x410/0x410
[ 3192.638522][T10691] ? psi_memstall_leave+0x174/0x250
[ 3192.643735][T10691] ? lock_downgrade+0x690/0x690
[ 3192.648602][T10691] kernel_clone+0xeb/0x890
[ 3192.653052][T10691] ? create_io_thread+0xf0/0xf0
[ 3192.657928][T10691] ? percpu_ref_put_many.constprop.0+0x6a/0x1b0
[ 3192.664181][T10691] ? lock_downgrade+0x690/0x690
[ 3192.669085][T10691] __do_sys_clone+0xba/0x100
[ 3192.673674][T10691] ? kernel_clone+0x890/0x890
[ 3192.678369][T10691] ? syscall_enter_from_user_mode+0x26/0x80
[ 3192.684264][T10691] do_syscall_64+0x39/0xb0
[ 3192.688685][T10691] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 3192.694588][T10691] RIP: 0033:0x7f7b21a8d591
[ 3192.699015][T10691] Code: 48 85 ff 74 3d 48 85 f6 74 38 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 7c 13 74 01 c3 31 ed 58 5f ff d0 48 89 c7 b8 3c 00 00 00
[ 3192.718637][T10691] RSP: 002b:00007f7b21ccfa68 EFLAGS: 00000206 ORIG_RAX: 0000000000000038
[ 3192.727059][T10691] RAX: ffffffffffffffda RBX: 00007f7b2276c700 RCX: 00007f7b21a8d591
[ 3192.735031][T10691] RDX: 00007f7b2276c9d0 RSI: 00007f7b2276c2f0 RDI: 00000000003d0f00
[ 3192.743006][T10691] RBP: 00007f7b21ccfcb0 R08: 00007f7b2276c700 R09: 00007f7b2276c700
[ 3192.750986][T10691] R10: 00007f7b2276c9d0 R11: 0000000000000206 R12: 00007f7b21ccfb1e
[ 3192.758949][T10691] R13: 00007f7b21ccfb1f R14: 00007f7b2276c300 R15: 0000000000022000
[ 3192.766925][T10691]
05:07:33 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}], 0x1, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:33 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}], 0x1, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:33 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}], 0x1, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:33 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x0, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:34 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}], 0x1, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:34 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x0, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:34 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
ftruncate(0xffffffffffffffff, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3193.958736][T10691] memory: usage 307200kB, limit 307200kB, failcnt 4513
[ 3194.037329][T10691] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3194.063534][T10691] Memory cgroup stats for /syz1:
[ 3194.063689][T10691] anon 98304
[ 3194.063689][T10691] file 225280
[ 3194.063689][T10691] kernel 314249216
[ 3194.063689][T10691] kernel_stack 32768
[ 3194.063689][T10691] pagetables 73728
[ 3194.063689][T10691] sec_pagetables 0
[ 3194.063689][T10691] percpu 5433696
[ 3194.063689][T10691] sock 0
[ 3194.063689][T10691] vmalloc 8192
[ 3194.063689][T10691] shmem 225280
[ 3194.063689][T10691] zswap 0
[ 3194.063689][T10691] zswapped 0
[ 3194.063689][T10691] file_mapped 225280
[ 3194.063689][T10691] file_dirty 0
[ 3194.063689][T10691] file_writeback 0
[ 3194.063689][T10691] swapcached 0
[ 3194.063689][T10691] anon_thp 0
[ 3194.063689][T10691] file_thp 0
[ 3194.063689][T10691] shmem_thp 0
[ 3194.063689][T10691] inactive_anon 0
[ 3194.063689][T10691] active_anon 323584
[ 3194.063689][T10691] inactive_file 0
[ 3194.063689][T10691] active_file 0
[ 3194.063689][T10691] unevictable 0
[ 3194.063689][T10691] slab_reclaimable 54208
[ 3194.063689][T10691] slab_unreclaimable 308580112
[ 3194.063689][T10691] slab 308634320
[ 3194.063689][T10691] workingset_refault_anon 0
[ 3194.063689][T10691] workingset_refault_file 0
[ 3194.063689][T10691] workingset_activate_anon 0
[ 3194.063689][T10691] workingset_activate_file 0
[ 3194.063689][T10691] workingset_restore_anon 0
[ 3194.063689][T10691] workingset_restore_file 0
[ 3194.063689][T10691] workingset_nodereclaim 0
[ 3194.063689][T10691] pgscan 0
[ 3194.063689][T10691] pgsteal 0
[ 3194.063689][T10691] pgscan_kswapd 0
[ 3194.063689][T10691] pgscan_direct 0
[ 3194.063689][T10691] pgscan_khugepaged 0
[ 3194.063689][T10691] pgsteal_kswapd 0
[ 3194.063689][T10691] pgsteal_direct 0
[ 3194.063689][T10691] pgsteal_khugepaged 0
[ 3194.063689][T10691] pgfault 646074
[ 3194.063689][T10691] pgmajfault 0
[ 3194.063689][T10691] pgrefill 0
[ 3194.063689][T10691] pgactivate 0
[ 3194.063689][T10691] pgdeactivate 783
[ 3194.063689][T10691] pglazyfree 0
[ 3194.063689][T10691] pglazyfreed 0
[ 3194.063689][T10691] zswpin 0
[ 3194.063689][T10691] zswpout 0
[ 3194.063689][T10691] thp_fault_alloc 0
[ 3194.270853][ C0] net_ratelimit: 2170 callbacks suppressed
[ 3194.270866][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3194.288866][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3194.301423][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3194.313647][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3194.325821][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3194.337945][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3194.350469][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3194.362686][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3194.374868][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
05:07:34 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2={0xfc, 0x2, '\x00', 0x1}, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3194.386995][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3194.664409][T10691] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=10691,uid=0
[ 3194.797327][T10691] Memory cgroup out of memory: Killed process 10691 (syz-executor.1) total-vm:54548kB, anon-rss:384kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000
05:07:35 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0)
05:07:35 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {0x0}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:35 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x0, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3195.276907][T10731] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000
[ 3195.399141][T10731] CPU: 0 PID: 10731 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3195.407840][T10731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3195.417885][T10731] Call Trace:
[ 3195.421154][T10731]
[ 3195.424076][T10731] dump_stack_lvl+0x136/0x150
[ 3195.428748][T10731] dump_header+0x10a/0xd70
[ 3195.433160][T10731] oom_kill_process+0x25d/0x600
[ 3195.438029][T10731] out_of_memory+0x35c/0x1660
[ 3195.442700][T10731] ? find_held_lock+0x2d/0x110
[ 3195.447468][T10731] ? oom_killer_disable+0x2b0/0x2b0
[ 3195.452663][T10731] ? rcu_read_unlock+0x9/0x60
[ 3195.457335][T10731] ? find_held_lock+0x2d/0x110
[ 3195.462115][T10731] mem_cgroup_out_of_memory+0x206/0x270
[ 3195.467657][T10731] ? mem_cgroup_margin+0x130/0x130
[ 3195.472764][T10731] ? lock_downgrade+0x690/0x690
[ 3195.477628][T10731] try_charge_memcg+0xf9b/0x13b0
[ 3195.482573][T10731] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3195.488547][T10731] ? get_mem_cgroup_from_objcg+0xa1/0x280
[ 3195.494286][T10731] ? lock_downgrade+0x690/0x690
[ 3195.499133][T10731] ? lock_downgrade+0x690/0x690
[ 3195.503987][T10731] __memcg_kmem_charge_page+0x16e/0x3c0
[ 3195.509532][T10731] memcg_charge_kernel_stack.part.0+0x6c/0x150
[ 3195.515698][T10731] copy_process+0x13a7/0x7590
[ 3195.520383][T10731] ? __lock_acquire+0xbc5/0x5d40
[ 3195.525323][T10731] ? __cleanup_sighand+0xb0/0xb0
[ 3195.530261][T10731] ? lockdep_hardirqs_on_prepare+0x410/0x410
[ 3195.536237][T10731] ? psi_memstall_leave+0x174/0x250
[ 3195.541442][T10731] ? lock_downgrade+0x690/0x690
[ 3195.546293][T10731] kernel_clone+0xeb/0x890
[ 3195.550721][T10731] ? create_io_thread+0xf0/0xf0
[ 3195.555582][T10731] ? percpu_ref_put_many.constprop.0+0x6a/0x1b0
[ 3195.561829][T10731] ? lock_downgrade+0x690/0x690
[ 3195.566684][T10731] __do_sys_clone+0xba/0x100
[ 3195.571345][T10731] ? kernel_clone+0x890/0x890
[ 3195.576048][T10731] ? syscall_enter_from_user_mode+0x26/0x80
[ 3195.581944][T10731] do_syscall_64+0x39/0xb0
[ 3195.586386][T10731] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 3195.592298][T10731] RIP: 0033:0x7f7b21a8d591
[ 3195.596709][T10731] Code: 48 85 ff 74 3d 48 85 f6 74 38 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 7c 13 74 01 c3 31 ed 58 5f ff d0 48 89 c7 b8 3c 00 00 00
[ 3195.616310][T10731] RSP: 002b:00007f7b21ccfa68 EFLAGS: 00000206 ORIG_RAX: 0000000000000038
[ 3195.624726][T10731] RAX: ffffffffffffffda RBX: 00007f7b2276c700 RCX: 00007f7b21a8d591
[ 3195.632710][T10731] RDX: 00007f7b2276c9d0 RSI: 00007f7b2276c2f0 RDI: 00000000003d0f00
[ 3195.640673][T10731] RBP: 00007f7b21ccfcb0 R08: 00007f7b2276c700 R09: 00007f7b2276c700
05:07:36 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {0x0}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3195.648643][T10731] R10: 00007f7b2276c9d0 R11: 0000000000000206 R12: 00007f7b21ccfb1e
[ 3195.656610][T10731] R13: 00007f7b21ccfb1f R14: 00007f7b2276c300 R15: 0000000000022000
[ 3195.664586][T10731]
05:07:36 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
ftruncate(0xffffffffffffffff, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:36 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {0x0}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3195.941957][T10731] memory: usage 307164kB, limit 307200kB, failcnt 4594
[ 3195.963251][T10731] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3195.996029][T10731] Memory cgroup stats for /syz1:
[ 3195.996230][T10731] anon 98304
[ 3195.996230][T10731] file 225280
[ 3195.996230][T10731] kernel 314212352
[ 3195.996230][T10731] kernel_stack 32768
[ 3195.996230][T10731] pagetables 73728
[ 3195.996230][T10731] sec_pagetables 0
[ 3195.996230][T10731] percpu 5433632
[ 3195.996230][T10731] sock 0
[ 3195.996230][T10731] vmalloc 8192
[ 3195.996230][T10731] shmem 225280
[ 3195.996230][T10731] zswap 0
[ 3195.996230][T10731] zswapped 0
[ 3195.996230][T10731] file_mapped 225280
[ 3195.996230][T10731] file_dirty 0
[ 3195.996230][T10731] file_writeback 0
[ 3195.996230][T10731] swapcached 0
[ 3195.996230][T10731] anon_thp 0
[ 3195.996230][T10731] file_thp 0
[ 3195.996230][T10731] shmem_thp 0
[ 3195.996230][T10731] inactive_anon 0
[ 3195.996230][T10731] active_anon 323584
[ 3195.996230][T10731] inactive_file 0
[ 3195.996230][T10731] active_file 0
[ 3195.996230][T10731] unevictable 0
[ 3195.996230][T10731] slab_reclaimable 42208
[ 3195.996230][T10731] slab_unreclaimable 308557160
[ 3195.996230][T10731] slab 308599368
[ 3195.996230][T10731] workingset_refault_anon 0
[ 3195.996230][T10731] workingset_refault_file 0
[ 3195.996230][T10731] workingset_activate_anon 0
[ 3195.996230][T10731] workingset_activate_file 0
[ 3195.996230][T10731] workingset_restore_anon 0
[ 3195.996230][T10731] workingset_restore_file 0
[ 3195.996230][T10731] workingset_nodereclaim 0
[ 3195.996230][T10731] pgscan 0
[ 3195.996230][T10731] pgsteal 0
[ 3195.996230][T10731] pgscan_kswapd 0
[ 3195.996230][T10731] pgscan_direct 0
[ 3195.996230][T10731] pgscan_khugepaged 0
[ 3195.996230][T10731] pgsteal_kswapd 0
[ 3195.996230][T10731] pgsteal_direct 0
[ 3195.996230][T10731] pgsteal_khugepaged 0
[ 3195.996230][T10731] pgfault 646112
[ 3195.996230][T10731] pgmajfault 0
[ 3195.996230][T10731] pgrefill 0
[ 3195.996230][T10731] pgactivate 0
[ 3195.996230][T10731] pgdeactivate 783
[ 3195.996230][T10731] pglazyfree 0
[ 3195.996230][T10731] pglazyfreed 0
[ 3195.996230][T10731] zswpin 0
[ 3195.996230][T10731] zswpout 0
[ 3195.996230][T10731] thp_fault_alloc 0
[ 3196.627849][T10731] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=10731,uid=0
[ 3196.653703][T10731] Memory cgroup out of memory: Killed process 10731 (syz-executor.1) total-vm:54548kB, anon-rss:384kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000
05:07:37 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x0, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:37 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}, 0x1, 0x0, 0x0, 0xfffffff5}, 0x0)
05:07:37 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x0, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:37 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000006180)=""/152, 0x98}], 0x1, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3196.991961][T10749] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000
[ 3197.026450][T10749] CPU: 1 PID: 10749 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3197.035170][T10749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3197.045226][T10749] Call Trace:
[ 3197.048508][T10749]
[ 3197.051434][T10749] dump_stack_lvl+0x136/0x150
[ 3197.056108][T10749] dump_header+0x10a/0xd70
[ 3197.060524][T10749] oom_kill_process+0x25d/0x600
[ 3197.065397][T10749] out_of_memory+0x35c/0x1660
[ 3197.070090][T10749] ? find_held_lock+0x2d/0x110
[ 3197.074856][T10749] ? oom_killer_disable+0x2b0/0x2b0
[ 3197.080050][T10749] ? rcu_read_unlock+0x9/0x60
[ 3197.084752][T10749] ? find_held_lock+0x2d/0x110
[ 3197.089523][T10749] mem_cgroup_out_of_memory+0x206/0x270
[ 3197.095070][T10749] ? mem_cgroup_margin+0x130/0x130
[ 3197.100180][T10749] ? lock_downgrade+0x690/0x690
[ 3197.105048][T10749] try_charge_memcg+0xf9b/0x13b0
[ 3197.109985][T10749] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3197.115956][T10749] ? get_mem_cgroup_from_objcg+0xa1/0x280
[ 3197.121674][T10749] ? lock_downgrade+0x690/0x690
[ 3197.126528][T10749] ? lock_downgrade+0x690/0x690
[ 3197.131383][T10749] __memcg_kmem_charge_page+0x16e/0x3c0
[ 3197.136925][T10749] memcg_charge_kernel_stack.part.0+0x6c/0x150
[ 3197.143091][T10749] copy_process+0x13a7/0x7590
[ 3197.147778][T10749] ? __lock_acquire+0xbc5/0x5d40
[ 3197.152719][T10749] ? __cleanup_sighand+0xb0/0xb0
[ 3197.157657][T10749] ? lockdep_hardirqs_on_prepare+0x410/0x410
[ 3197.163638][T10749] ? psi_memstall_leave+0x174/0x250
[ 3197.168834][T10749] ? lock_downgrade+0x690/0x690
[ 3197.173681][T10749] kernel_clone+0xeb/0x890
[ 3197.178092][T10749] ? create_io_thread+0xf0/0xf0
[ 3197.182944][T10749] ? percpu_ref_put_many.constprop.0+0x6a/0x1b0
[ 3197.189225][T10749] ? lock_downgrade+0x690/0x690
[ 3197.194095][T10749] __do_sys_clone+0xba/0x100
[ 3197.198698][T10749] ? kernel_clone+0x890/0x890
[ 3197.203377][T10749] ? syscall_enter_from_user_mode+0x26/0x80
[ 3197.209273][T10749] do_syscall_64+0x39/0xb0
[ 3197.213692][T10749] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 3197.219602][T10749] RIP: 0033:0x7f7b21a8d591
[ 3197.224014][T10749] Code: 48 85 ff 74 3d 48 85 f6 74 38 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 7c 13 74 01 c3 31 ed 58 5f ff d0 48 89 c7 b8 3c 00 00 00
[ 3197.243609][T10749] RSP: 002b:00007f7b21ccfa68 EFLAGS: 00000206 ORIG_RAX: 0000000000000038
[ 3197.252016][T10749] RAX: ffffffffffffffda RBX: 00007f7b2276c700 RCX: 00007f7b21a8d591
[ 3197.259993][T10749] RDX: 00007f7b2276c9d0 RSI: 00007f7b2276c2f0 RDI: 00000000003d0f00
[ 3197.267990][T10749] RBP: 00007f7b21ccfcb0 R08: 00007f7b2276c700 R09: 00007f7b2276c700
[ 3197.275987][T10749] R10: 00007f7b2276c9d0 R11: 0000000000000206 R12: 00007f7b21ccfb1e
[ 3197.283982][T10749] R13: 00007f7b21ccfb1f R14: 00007f7b2276c300 R15: 0000000000022000
[ 3197.291996][T10749]
05:07:37 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
ftruncate(0xffffffffffffffff, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:37 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x0, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:38 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000006180)=""/152, 0x98}], 0x1, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:38 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000006180)=""/152, 0x98}], 0x1, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:38 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x0, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:38 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{0x0}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:39 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x0, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:39 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:39 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{0x0}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3198.906133][T10749] memory: usage 307184kB, limit 307200kB, failcnt 4673
[ 3198.945997][T10749] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3199.029051][T10749] Memory cgroup stats for /syz1:
[ 3199.029308][T10749] anon 98304
[ 3199.029308][T10749] file 225280
[ 3199.029308][T10749] kernel 314232832
[ 3199.029308][T10749] kernel_stack 32768
[ 3199.029308][T10749] pagetables 73728
[ 3199.029308][T10749] sec_pagetables 0
[ 3199.029308][T10749] percpu 5433632
[ 3199.029308][T10749] sock 0
[ 3199.029308][T10749] vmalloc 8192
[ 3199.029308][T10749] shmem 225280
[ 3199.029308][T10749] zswap 0
[ 3199.029308][T10749] zswapped 0
[ 3199.029308][T10749] file_mapped 225280
[ 3199.029308][T10749] file_dirty 0
[ 3199.029308][T10749] file_writeback 0
[ 3199.029308][T10749] swapcached 0
[ 3199.029308][T10749] anon_thp 0
[ 3199.029308][T10749] file_thp 0
[ 3199.029308][T10749] shmem_thp 0
[ 3199.029308][T10749] inactive_anon 0
[ 3199.029308][T10749] active_anon 323584
[ 3199.029308][T10749] inactive_file 0
[ 3199.029308][T10749] active_file 0
[ 3199.029308][T10749] unevictable 0
[ 3199.029308][T10749] slab_reclaimable 52664
[ 3199.029308][T10749] slab_unreclaimable 308576304
[ 3199.029308][T10749] slab 308628968
[ 3199.029308][T10749] workingset_refault_anon 0
[ 3199.029308][T10749] workingset_refault_file 0
[ 3199.029308][T10749] workingset_activate_anon 0
[ 3199.029308][T10749] workingset_activate_file 0
[ 3199.029308][T10749] workingset_restore_anon 0
[ 3199.029308][T10749] workingset_restore_file 0
[ 3199.029308][T10749] workingset_nodereclaim 0
[ 3199.029308][T10749] pgscan 0
[ 3199.029308][T10749] pgsteal 0
[ 3199.029308][T10749] pgscan_kswapd 0
[ 3199.029308][T10749] pgscan_direct 0
[ 3199.029308][T10749] pgscan_khugepaged 0
[ 3199.029308][T10749] pgsteal_kswapd 0
[ 3199.029308][T10749] pgsteal_direct 0
[ 3199.029308][T10749] pgsteal_khugepaged 0
[ 3199.029308][T10749] pgfault 646147
[ 3199.029308][T10749] pgmajfault 0
[ 3199.029308][T10749] pgrefill 0
[ 3199.029308][T10749] pgactivate 0
[ 3199.029308][T10749] pgdeactivate 783
[ 3199.029308][T10749] pglazyfree 0
[ 3199.029308][T10749] pglazyfreed 0
[ 3199.029308][T10749] zswpin 0
[ 3199.029308][T10749] zswpout 0
[ 3199.029308][T10749] thp_fault_alloc 0
[ 3199.282551][ C1] net_ratelimit: 1968 callbacks suppressed
[ 3199.282568][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies.
[ 3199.298155][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3199.310719][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3199.323012][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3199.335512][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3199.347640][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3199.360161][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3199.372302][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3199.384799][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3199.396927][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3200.055930][T10749] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=10749,uid=0
[ 3200.199513][T10749] Memory cgroup out of memory: Killed process 10749 (syz-executor.1) total-vm:54548kB, anon-rss:384kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000
05:07:40 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x0, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:40 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{0x0}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:40 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:40 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}, 0x1, 0x0, 0x0, 0xfffffffc}, 0x0)
05:07:40 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x0, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:41 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x0, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:41 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, 0x0, 0x0, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3201.062536][T10807] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=1, oom_score_adj=1000
[ 3201.163235][T10807] CPU: 1 PID: 10807 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3201.171989][T10807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3201.182075][T10807] Call Trace:
[ 3201.185373][T10807]
[ 3201.188325][T10807] dump_stack_lvl+0x136/0x150
[ 3201.193038][T10807] dump_header+0x10a/0xd70
[ 3201.197494][T10807] oom_kill_process+0x25d/0x600
[ 3201.202385][T10807] out_of_memory+0x35c/0x1660
[ 3201.207109][T10807] ? find_held_lock+0x2d/0x110
[ 3201.211920][T10807] ? oom_killer_disable+0x2b0/0x2b0
[ 3201.217141][T10807] ? rcu_read_unlock+0x9/0x60
[ 3201.221840][T10807] ? find_held_lock+0x2d/0x110
[ 3201.226625][T10807] mem_cgroup_out_of_memory+0x206/0x270
[ 3201.232170][T10807] ? mem_cgroup_margin+0x130/0x130
[ 3201.237276][T10807] ? lock_downgrade+0x690/0x690
[ 3201.242183][T10807] try_charge_memcg+0xf9b/0x13b0
[ 3201.247117][T10807] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3201.253087][T10807] ? get_mem_cgroup_from_objcg+0xa1/0x280
[ 3201.258803][T10807] ? lock_downgrade+0x690/0x690
[ 3201.263667][T10807] ? lock_downgrade+0x690/0x690
[ 3201.268510][T10807] ? rcu_read_unlock+0x9/0x60
[ 3201.273192][T10807] obj_cgroup_charge+0x2af/0x5e0
[ 3201.278128][T10807] ? copy_process+0x3aa/0x7590
[ 3201.282886][T10807] kmem_cache_alloc_node+0xa8/0x3e0
[ 3201.288104][T10807] copy_process+0x3aa/0x7590
[ 3201.292705][T10807] ? __lock_acquire+0xbc5/0x5d40
[ 3201.297659][T10807] ? __cleanup_sighand+0xb0/0xb0
[ 3201.302590][T10807] ? lockdep_hardirqs_on_prepare+0x410/0x410
[ 3201.308603][T10807] ? psi_memstall_leave+0x174/0x250
[ 3201.313801][T10807] ? lock_downgrade+0x690/0x690
[ 3201.318655][T10807] kernel_clone+0xeb/0x890
[ 3201.323069][T10807] ? create_io_thread+0xf0/0xf0
[ 3201.327915][T10807] ? percpu_ref_put_many.constprop.0+0x6a/0x1b0
[ 3201.334152][T10807] ? lock_downgrade+0x690/0x690
[ 3201.339001][T10807] __do_sys_clone+0xba/0x100
[ 3201.343587][T10807] ? kernel_clone+0x890/0x890
[ 3201.348265][T10807] ? syscall_enter_from_user_mode+0x26/0x80
[ 3201.354156][T10807] do_syscall_64+0x39/0xb0
[ 3201.358660][T10807] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 3201.364548][T10807] RIP: 0033:0x7f7b21a8d591
[ 3201.368954][T10807] Code: 48 85 ff 74 3d 48 85 f6 74 38 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 7c 13 74 01 c3 31 ed 58 5f ff d0 48 89 c7 b8 3c 00 00 00
[ 3201.388550][T10807] RSP: 002b:00007f7b21ccfa68 EFLAGS: 00000206 ORIG_RAX: 0000000000000038
[ 3201.396973][T10807] RAX: ffffffffffffffda RBX: 00007f7b2276c700 RCX: 00007f7b21a8d591
[ 3201.404934][T10807] RDX: 00007f7b2276c9d0 RSI: 00007f7b2276c2f0 RDI: 00000000003d0f00
05:07:41 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, 0x0, 0x0, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3201.412893][T10807] RBP: 00007f7b21ccfcb0 R08: 00007f7b2276c700 R09: 00007f7b2276c700
[ 3201.420853][T10807] R10: 00007f7b2276c9d0 R11: 0000000000000206 R12: 00007f7b21ccfb1e
[ 3201.428813][T10807] R13: 00007f7b21ccfb1f R14: 00007f7b2276c300 R15: 0000000000022000
[ 3201.436788][T10807]
05:07:42 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:42 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x0, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:42 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, 0x0, 0x0, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:42 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x0, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3202.169557][T10807] memory: usage 307152kB, limit 307200kB, failcnt 4788
[ 3202.195778][T10807] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
05:07:42 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x0, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
05:07:42 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640), 0x0, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3202.289276][T10807] Memory cgroup stats for /syz1:
[ 3202.289631][T10807] anon 98304
[ 3202.289631][T10807] file 225280
[ 3202.289631][T10807] kernel 314200064
[ 3202.289631][T10807] kernel_stack 32768
[ 3202.289631][T10807] pagetables 73728
[ 3202.289631][T10807] sec_pagetables 0
[ 3202.289631][T10807] percpu 5433632
[ 3202.289631][T10807] sock 0
[ 3202.289631][T10807] vmalloc 8192
[ 3202.289631][T10807] shmem 225280
[ 3202.289631][T10807] zswap 0
[ 3202.289631][T10807] zswapped 0
[ 3202.289631][T10807] file_mapped 225280
[ 3202.289631][T10807] file_dirty 0
[ 3202.289631][T10807] file_writeback 0
[ 3202.289631][T10807] swapcached 0
[ 3202.289631][T10807] anon_thp 0
[ 3202.289631][T10807] file_thp 0
[ 3202.289631][T10807] shmem_thp 0
[ 3202.289631][T10807] inactive_anon 0
[ 3202.289631][T10807] active_anon 323584
[ 3202.289631][T10807] inactive_file 0
[ 3202.289631][T10807] active_file 0
[ 3202.289631][T10807] unevictable 0
[ 3202.289631][T10807] slab_reclaimable 51120
[ 3202.289631][T10807] slab_unreclaimable 308552168
[ 3202.289631][T10807] slab 308603288
[ 3202.289631][T10807] workingset_refault_anon 0
[ 3202.289631][T10807] workingset_refault_file 0
[ 3202.289631][T10807] workingset_activate_anon 0
[ 3202.289631][T10807] workingset_activate_file 0
[ 3202.289631][T10807] workingset_restore_anon 0
[ 3202.289631][T10807] workingset_restore_file 0
[ 3202.289631][T10807] workingset_nodereclaim 0
[ 3202.289631][T10807] pgscan 0
[ 3202.289631][T10807] pgsteal 0
[ 3202.289631][T10807] pgscan_kswapd 0
[ 3202.289631][T10807] pgscan_direct 0
[ 3202.289631][T10807] pgscan_khugepaged 0
[ 3202.289631][T10807] pgsteal_kswapd 0
[ 3202.289631][T10807] pgsteal_direct 0
[ 3202.289631][T10807] pgsteal_khugepaged 0
[ 3202.289631][T10807] pgfault 646185
[ 3202.289631][T10807] pgmajfault 0
[ 3202.289631][T10807] pgrefill 0
[ 3202.289631][T10807] pgactivate 0
[ 3202.289631][T10807] pgdeactivate 783
[ 3202.289631][T10807] pglazyfree 0
[ 3202.289631][T10807] pglazyfreed 0
[ 3202.289631][T10807] zswpin 0
[ 3202.289631][T10807] zswpout 0
[ 3202.289631][T10807] thp_fault_alloc 0
05:07:43 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640), 0x0, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3203.271338][T10807] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=10807,uid=0
[ 3203.346591][T10807] Memory cgroup out of memory: Killed process 10807 (syz-executor.1) total-vm:54548kB, anon-rss:384kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000
05:07:44 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}, 0x1, 0x0, 0x0, 0xffffffff}, 0x0)
05:07:44 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x0, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:44 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x0, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
05:07:44 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:44 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640), 0x0, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:44 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x0, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:44 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{0x0}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:44 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3204.254069][T10861] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000
[ 3204.301605][ C0] net_ratelimit: 2483 callbacks suppressed
[ 3204.301619][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3204.319711][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3204.331958][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3204.344085][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3204.356555][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3204.368807][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3204.380966][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
05:07:44 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{0x0}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3204.393053][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3204.405582][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3204.417820][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3204.462385][T10861] CPU: 0 PID: 10861 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3204.471100][T10861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3204.481163][T10861] Call Trace:
[ 3204.484434][T10861]
[ 3204.487357][T10861] dump_stack_lvl+0x136/0x150
[ 3204.492031][T10861] dump_header+0x10a/0xd70
[ 3204.496447][T10861] oom_kill_process+0x25d/0x600
[ 3204.501295][T10861] out_of_memory+0x35c/0x1660
[ 3204.506004][T10861] ? find_held_lock+0x2d/0x110
[ 3204.510768][T10861] ? oom_killer_disable+0x2b0/0x2b0
[ 3204.515959][T10861] ? rcu_read_unlock+0x9/0x60
[ 3204.520631][T10861] ? find_held_lock+0x2d/0x110
[ 3204.525412][T10861] mem_cgroup_out_of_memory+0x206/0x270
[ 3204.530958][T10861] ? mem_cgroup_margin+0x130/0x130
[ 3204.536064][T10861] ? lock_downgrade+0x690/0x690
[ 3204.540917][T10861] try_charge_memcg+0xf9b/0x13b0
[ 3204.545865][T10861] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3204.551839][T10861] ? rcu_read_unlock+0x9/0x60
[ 3204.556515][T10861] ? lock_downgrade+0x690/0x690
[ 3204.561388][T10861] charge_memcg+0x90/0x3b0
[ 3204.565798][T10861] __mem_cgroup_charge+0x2b/0x90
[ 3204.570728][T10861] ? copy_mc_to_kernel+0x3e/0x90
[ 3204.575666][T10861] do_wp_page+0x8eb/0x3520
[ 3204.580083][T10861] ? lock_release+0x670/0x670
[ 3204.584750][T10861] ? finish_mkwrite_fault+0x3d0/0x3d0
[ 3204.590117][T10861] ? do_raw_spin_lock+0x124/0x2b0
[ 3204.595135][T10861] ? spin_bug+0x1c0/0x1c0
[ 3204.599454][T10861] ? lock_downgrade+0x690/0x690
[ 3204.604300][T10861] __handle_mm_fault+0x19a1/0x3e60
[ 3204.609414][T10861] ? vm_iomap_memory+0x190/0x190
[ 3204.614376][T10861] handle_mm_fault+0x2ba/0x9c0
[ 3204.619139][T10861] do_user_addr_fault+0x475/0x1230
[ 3204.624249][T10861] ? rcu_is_watching+0x12/0xb0
[ 3204.629010][T10861] exc_page_fault+0x98/0x170
[ 3204.633596][T10861] asm_exc_page_fault+0x26/0x30
[ 3204.638455][T10861] RIP: 0033:0x7f7b21a36f7e
[ 3204.642860][T10861] Code: 10 4c 89 35 14 50 17 00 89 78 28 8b 7c 24 18 89 78 2c 8b 7c 24 54 89 78 78 48 8b 3c 24 88 4c 3a 04 8b 7c 24 4c 48 8b 54 24 40 <89> b8 80 00 00 00 0f 1f 40 00 48 8b 8c 14 50 01 00 00 48 83 c2 08
[ 3204.662459][T10861] RSP: 002b:00007f7b21ccfba0 EFLAGS: 00010246
[ 3204.668516][T10861] RAX: 00007f7b21babf80 RBX: 00007f7b21babf8c RCX: 0000000000000000
[ 3204.676488][T10861] RDX: 0000000000000000 RSI: 00007f7b21babf88 RDI: 0000000000000000
[ 3204.684450][T10861] RBP: 00007f7b21babf80 R08: 00007f7b2276c700 R09: 00007f7b2276c700
[ 3204.692427][T10861] R10: 00007f7b2276c9d0 R11: 0000000000000206 R12: 00007f7b21babf8c
[ 3204.700388][T10861] R13: 00007f7b21600060 R14: 00007f7b21babf80 R15: 0000000000000000
[ 3204.708361][T10861]
[ 3204.774007][ T1202] ieee802154 phy0 wpan0: encryption failed: -22
[ 3204.780339][ T1202] ieee802154 phy1 wpan1: encryption failed: -22
05:07:45 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:45 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x0, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
05:07:45 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{0x0}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3205.258648][T10861] memory: usage 307200kB, limit 307200kB, failcnt 4877
[ 3205.329080][T10861] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3206.181950][T10861] Memory cgroup stats for /syz1:
[ 3206.182208][T10861] anon 98304
[ 3206.182208][T10861] file 225280
[ 3206.182208][T10861] kernel 314175488
[ 3206.182208][T10861] kernel_stack 65536
[ 3206.182208][T10861] pagetables 73728
[ 3206.182208][T10861] sec_pagetables 0
[ 3206.182208][T10861] percpu 5433504
[ 3206.182208][T10861] sock 0
[ 3206.182208][T10861] vmalloc 8192
[ 3206.182208][T10861] shmem 225280
[ 3206.182208][T10861] zswap 0
[ 3206.182208][T10861] zswapped 0
[ 3206.182208][T10861] file_mapped 225280
[ 3206.182208][T10861] file_dirty 0
[ 3206.182208][T10861] file_writeback 0
[ 3206.182208][T10861] swapcached 0
[ 3206.182208][T10861] anon_thp 0
[ 3206.182208][T10861] file_thp 0
[ 3206.182208][T10861] shmem_thp 0
[ 3206.182208][T10861] inactive_anon 0
[ 3206.182208][T10861] active_anon 323584
[ 3206.182208][T10861] inactive_file 0
[ 3206.182208][T10861] active_file 0
[ 3206.182208][T10861] unevictable 0
[ 3206.182208][T10861] slab_reclaimable 35608
[ 3206.182208][T10861] slab_unreclaimable 308519784
[ 3206.182208][T10861] slab 308555392
[ 3206.182208][T10861] workingset_refault_anon 0
[ 3206.182208][T10861] workingset_refault_file 0
[ 3206.182208][T10861] workingset_activate_anon 0
[ 3206.182208][T10861] workingset_activate_file 0
[ 3206.182208][T10861] workingset_restore_anon 0
[ 3206.182208][T10861] workingset_restore_file 0
[ 3206.182208][T10861] workingset_nodereclaim 0
[ 3206.182208][T10861] pgscan 0
[ 3206.182208][T10861] pgsteal 0
[ 3206.182208][T10861] pgscan_kswapd 0
[ 3206.182208][T10861] pgscan_direct 0
[ 3206.182208][T10861] pgscan_khugepaged 0
[ 3206.182208][T10861] pgsteal_kswapd 0
[ 3206.182208][T10861] pgsteal_direct 0
[ 3206.182208][T10861] pgsteal_khugepaged 0
[ 3206.182208][T10861] pgfault 646224
[ 3206.182208][T10861] pgmajfault 0
[ 3206.182208][T10861] pgrefill 0
[ 3206.182208][T10861] pgactivate 0
[ 3206.182208][T10861] pgdeactivate 783
[ 3206.182208][T10861] pglazyfree 0
[ 3206.182208][T10861] pglazyfreed 0
[ 3206.182208][T10861] zswpin 0
[ 3206.182208][T10861] zswpout 0
[ 3206.182208][T10861] thp_fault_alloc 0
[ 3207.198805][T10861] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=10861,uid=0
[ 3207.300584][T10861] Memory cgroup out of memory: Killed process 10861 (syz-executor.1) total-vm:54548kB, anon-rss:384kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000
05:07:47 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0x2)
05:07:47 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x0, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:47 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x0, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:47 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
sendto$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(0xffffffffffffffff, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:47 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(0x0, 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:47 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x0, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
creat(&(0x7f0000000380)='./bus\x00', 0x0)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3207.609566][T10897] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000
[ 3207.713221][T10897] CPU: 1 PID: 10897 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3207.721968][T10897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3207.732032][T10897] Call Trace:
[ 3207.735321][T10897]
[ 3207.738247][T10897] dump_stack_lvl+0x136/0x150
[ 3207.742921][T10897] dump_header+0x10a/0xd70
[ 3207.747334][T10897] oom_kill_process+0x25d/0x600
[ 3207.752181][T10897] out_of_memory+0x35c/0x1660
[ 3207.756857][T10897] ? find_held_lock+0x2d/0x110
[ 3207.761620][T10897] ? oom_killer_disable+0x2b0/0x2b0
[ 3207.766814][T10897] ? rcu_read_unlock+0x9/0x60
[ 3207.771488][T10897] ? find_held_lock+0x2d/0x110
[ 3207.776264][T10897] mem_cgroup_out_of_memory+0x206/0x270
[ 3207.781812][T10897] ? mem_cgroup_margin+0x130/0x130
[ 3207.786921][T10897] ? lock_downgrade+0x690/0x690
[ 3207.791773][T10897] try_charge_memcg+0xf9b/0x13b0
[ 3207.796707][T10897] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3207.802699][T10897] ? rcu_read_unlock+0x9/0x60
[ 3207.807391][T10897] ? lock_downgrade+0x690/0x690
[ 3207.812243][T10897] charge_memcg+0x90/0x3b0
[ 3207.816654][T10897] __mem_cgroup_charge+0x2b/0x90
[ 3207.821599][T10897] do_wp_page+0x8eb/0x3520
[ 3207.826029][T10897] ? lock_release+0x670/0x670
[ 3207.830702][T10897] ? finish_mkwrite_fault+0x3d0/0x3d0
[ 3207.836071][T10897] ? do_raw_spin_lock+0x124/0x2b0
[ 3207.841109][T10897] ? spin_bug+0x1c0/0x1c0
[ 3207.845430][T10897] ? lock_downgrade+0x690/0x690
[ 3207.850299][T10897] __handle_mm_fault+0x19a1/0x3e60
[ 3207.855433][T10897] ? vm_iomap_memory+0x190/0x190
[ 3207.860381][T10897] handle_mm_fault+0x2ba/0x9c0
[ 3207.865142][T10897] do_user_addr_fault+0x475/0x1230
[ 3207.870263][T10897] ? rcu_is_watching+0x12/0xb0
[ 3207.875060][T10897] exc_page_fault+0x98/0x170
[ 3207.879649][T10897] asm_exc_page_fault+0x26/0x30
[ 3207.884496][T10897] RIP: 0033:0x7f7b21a39610
[ 3207.888906][T10897] Code: fe ff 49 39 dc 75 eb 48 8b 44 24 18 89 28 48 83 c4 28 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 44 00 00 41 89 c5 e9 75 fe ff ff <43> 89 2c 84 e9 a3 fe ff ff 0f 1f 80 00 00 00 00 49 39 d4 74 70 48
[ 3207.908509][T10897] RSP: 002b:00007f7b21ccfac0 EFLAGS: 00010246
[ 3207.914568][T10897] RAX: 00000000d489b7a9 RBX: 00007f7b21bac018 RCX: 0000001b32920000
[ 3207.922530][T10897] RDX: 0000000000000000 RSI: 0000001b32920018 RDI: 000000000a26e479
[ 3207.930489][T10897] RBP: 00000000d489b7a9 R08: 00000000000017a9 R09: 00000000d489b7ad
[ 3207.938473][T10897] R10: 00007f7b21ccfc80 R11: 0000000000000246 R12: 00007f7b21ba0000
[ 3207.946436][T10897] R13: 0000000000000001 R14: 000000000000000c R15: ffffffff83d3ded4
[ 3207.954397][T10897] ? apparmor_socket_create+0xe4/0x670
[ 3207.959863][T10897]
05:07:49 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
sendto$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(0xffffffffffffffff, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:49 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x0, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
creat(&(0x7f0000000380)='./bus\x00', 0x0)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3208.629287][T10897] memory: usage 307200kB, limit 307200kB, failcnt 4904
[ 3208.644556][T10897] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3208.659400][T10897] Memory cgroup stats for /syz1:
[ 3208.663950][T10897] anon 135168
[ 3208.663950][T10897] file 225280
[ 3208.663950][T10897] kernel 314212352
[ 3208.663950][T10897] kernel_stack 65536
[ 3208.663950][T10897] pagetables 73728
[ 3208.663950][T10897] sec_pagetables 0
[ 3208.663950][T10897] percpu 5433568
[ 3208.663950][T10897] sock 0
[ 3208.663950][T10897] vmalloc 8192
[ 3208.663950][T10897] shmem 225280
[ 3208.663950][T10897] zswap 0
[ 3208.663950][T10897] zswapped 0
[ 3208.663950][T10897] file_mapped 225280
[ 3208.663950][T10897] file_dirty 0
[ 3208.663950][T10897] file_writeback 0
[ 3208.663950][T10897] swapcached 0
[ 3208.663950][T10897] anon_thp 0
[ 3208.663950][T10897] file_thp 0
[ 3208.663950][T10897] shmem_thp 0
[ 3208.663950][T10897] inactive_anon 0
[ 3208.663950][T10897] active_anon 360448
[ 3208.663950][T10897] inactive_file 0
[ 3208.663950][T10897] active_file 0
[ 3208.663950][T10897] unevictable 0
[ 3208.663950][T10897] slab_reclaimable 42208
[ 3208.663950][T10897] slab_unreclaimable 308545040
[ 3208.663950][T10897] slab 308587248
[ 3208.663950][T10897] workingset_refault_anon 0
[ 3208.663950][T10897] workingset_refault_file 0
[ 3208.663950][T10897] workingset_activate_anon 0
[ 3208.663950][T10897] workingset_activate_file 0
[ 3208.663950][T10897] workingset_restore_anon 0
[ 3208.663950][T10897] workingset_restore_file 0
[ 3208.663950][T10897] workingset_nodereclaim 0
[ 3208.663950][T10897] pgscan 0
[ 3208.663950][T10897] pgsteal 0
[ 3208.663950][T10897] pgscan_kswapd 0
[ 3208.663950][T10897] pgscan_direct 0
[ 3208.663950][T10897] pgscan_khugepaged 0
[ 3208.663950][T10897] pgsteal_kswapd 0
[ 3208.663950][T10897] pgsteal_direct 0
[ 3208.663950][T10897] pgsteal_khugepaged 0
[ 3208.663950][T10897] pgfault 646279
[ 3208.663950][T10897] pgmajfault 0
[ 3208.663950][T10897] pgrefill 0
[ 3208.663950][T10897] pgactivate 0
[ 3208.663950][T10897] pgdeactivate 783
[ 3208.663950][T10897] pglazyfree 0
[ 3208.663950][T10897] pglazyfreed 0
[ 3208.663950][T10897] zswpin 0
[ 3208.663950][T10897] zswpout 0
[ 3208.663950][T10897] thp_fault_alloc 0
05:07:49 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x0, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
05:07:49 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(0x0, 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:49 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x0, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3209.363358][ C1] net_ratelimit: 2737 callbacks suppressed
[ 3209.363371][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3209.381388][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3209.393691][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies.
[ 3209.403807][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3209.416069][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3209.428818][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3209.440922][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3209.453523][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3209.465620][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3209.478230][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
05:07:50 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x0, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
[ 3209.890547][T10897] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=10897,uid=0
[ 3209.935501][T10897] Memory cgroup out of memory: Killed process 10897 (syz-executor.1) total-vm:54548kB, anon-rss:512kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000
05:07:50 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0x3)
05:07:50 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
sendto$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(0xffffffffffffffff, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:50 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x0, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
creat(&(0x7f0000000380)='./bus\x00', 0x0)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:50 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(0x0, 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:51 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x0, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3210.802134][T10935] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000
[ 3210.969829][T10935] CPU: 1 PID: 10935 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3210.978543][T10935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3210.988617][T10935] Call Trace:
[ 3210.991919][T10935]
[ 3210.994861][T10935] dump_stack_lvl+0x136/0x150
[ 3210.999550][T10935] dump_header+0x10a/0xd70
[ 3211.004012][T10935] oom_kill_process+0x25d/0x600
[ 3211.008904][T10935] out_of_memory+0x35c/0x1660
[ 3211.013619][T10935] ? find_held_lock+0x2d/0x110
[ 3211.018429][T10935] ? oom_killer_disable+0x2b0/0x2b0
[ 3211.023666][T10935] ? rcu_read_unlock+0x9/0x60
[ 3211.028378][T10935] ? find_held_lock+0x2d/0x110
[ 3211.033181][T10935] mem_cgroup_out_of_memory+0x206/0x270
[ 3211.038738][T10935] ? mem_cgroup_margin+0x130/0x130
[ 3211.043867][T10935] ? lock_downgrade+0x690/0x690
[ 3211.048750][T10935] try_charge_memcg+0xf9b/0x13b0
[ 3211.053709][T10935] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3211.059715][T10935] ? rcu_read_unlock+0x9/0x60
[ 3211.064393][T10935] ? lock_downgrade+0x690/0x690
[ 3211.069248][T10935] charge_memcg+0x90/0x3b0
[ 3211.073663][T10935] __mem_cgroup_charge+0x2b/0x90
[ 3211.078618][T10935] do_wp_page+0x8eb/0x3520
[ 3211.083077][T10935] ? lock_release+0x670/0x670
[ 3211.087778][T10935] ? finish_mkwrite_fault+0x3d0/0x3d0
[ 3211.093154][T10935] ? do_raw_spin_lock+0x124/0x2b0
[ 3211.098201][T10935] ? spin_bug+0x1c0/0x1c0
[ 3211.102528][T10935] ? lock_downgrade+0x690/0x690
[ 3211.107381][T10935] __handle_mm_fault+0x19a1/0x3e60
[ 3211.112541][T10935] ? vm_iomap_memory+0x190/0x190
[ 3211.117500][T10935] handle_mm_fault+0x2ba/0x9c0
[ 3211.122292][T10935] do_user_addr_fault+0x475/0x1230
[ 3211.127405][T10935] ? rcu_is_watching+0x12/0xb0
[ 3211.132188][T10935] exc_page_fault+0x98/0x170
[ 3211.136804][T10935] asm_exc_page_fault+0x26/0x30
[ 3211.141657][T10935] RIP: 0033:0x7f7b21a39610
[ 3211.146079][T10935] Code: fe ff 49 39 dc 75 eb 48 8b 44 24 18 89 28 48 83 c4 28 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 44 00 00 41 89 c5 e9 75 fe ff ff <43> 89 2c 84 e9 a3 fe ff ff 0f 1f 80 00 00 00 00 49 39 d4 74 70 48
[ 3211.165717][T10935] RSP: 002b:00007f7b21ccfac0 EFLAGS: 00010246
[ 3211.171802][T10935] RAX: 000000006f774e5f RBX: 00007f7b21bac018 RCX: 0000001b32920000
[ 3211.179785][T10935] RDX: 0000000000000000 RSI: 0000001b32920018 RDI: 000000000c7c1b1d
[ 3211.187751][T10935] RBP: 000000006f774e5f R08: 0000000000000e5f R09: 000000006f774e63
[ 3211.195734][T10935] R10: 00007f7b21ccfc80 R11: 0000000000000246 R12: 00007f7b21ba0000
[ 3211.203706][T10935] R13: 0000000000000001 R14: 0000000000000005 R15: ffffffff87f99422
[ 3211.211672][T10935] ? __sock_create+0x62/0x850
[ 3211.216380][T10935]
05:07:51 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:51 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:52 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x0, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
ftruncate(0xffffffffffffffff, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:52 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x0, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
05:07:52 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x0, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
creat(&(0x7f0000000380)='./bus\x00', 0x0)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:52 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x0, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:52 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3213.318269][T10935] memory: usage 307092kB, limit 307200kB, failcnt 4976
[ 3213.339125][T10935] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3213.409283][T10935] Memory cgroup stats for /syz1:
[ 3213.409430][T10935] anon 126976
[ 3213.409430][T10935] file 225280
[ 3213.409430][T10935] kernel 314109952
[ 3213.409430][T10935] kernel_stack 65536
[ 3213.409430][T10935] pagetables 73728
[ 3213.409430][T10935] sec_pagetables 0
[ 3213.409430][T10935] percpu 5433440
[ 3213.409430][T10935] sock 0
[ 3213.409430][T10935] vmalloc 8192
[ 3213.409430][T10935] shmem 225280
[ 3213.409430][T10935] zswap 0
[ 3213.409430][T10935] zswapped 0
[ 3213.409430][T10935] file_mapped 225280
[ 3213.409430][T10935] file_dirty 0
[ 3213.409430][T10935] file_writeback 0
[ 3213.409430][T10935] swapcached 0
[ 3213.409430][T10935] anon_thp 0
[ 3213.409430][T10935] file_thp 0
[ 3213.409430][T10935] shmem_thp 0
[ 3213.409430][T10935] inactive_anon 0
[ 3213.409430][T10935] active_anon 352256
[ 3213.409430][T10935] inactive_file 0
[ 3213.409430][T10935] active_file 0
[ 3213.409430][T10935] unevictable 0
[ 3213.409430][T10935] slab_reclaimable 18208
[ 3213.409430][T10935] slab_unreclaimable 308477512
[ 3213.409430][T10935] slab 308495720
[ 3213.409430][T10935] workingset_refault_anon 0
[ 3213.409430][T10935] workingset_refault_file 0
[ 3213.409430][T10935] workingset_activate_anon 0
[ 3213.409430][T10935] workingset_activate_file 0
[ 3213.409430][T10935] workingset_restore_anon 0
[ 3213.409430][T10935] workingset_restore_file 0
[ 3213.409430][T10935] workingset_nodereclaim 0
[ 3213.409430][T10935] pgscan 0
[ 3213.409430][T10935] pgsteal 0
[ 3213.409430][T10935] pgscan_kswapd 0
[ 3213.409430][T10935] pgscan_direct 0
[ 3213.409430][T10935] pgscan_khugepaged 0
[ 3213.409430][T10935] pgsteal_kswapd 0
[ 3213.409430][T10935] pgsteal_direct 0
[ 3213.409430][T10935] pgsteal_khugepaged 0
[ 3213.409430][T10935] pgfault 646330
[ 3213.409430][T10935] pgmajfault 0
[ 3213.409430][T10935] pgrefill 0
[ 3213.409430][T10935] pgactivate 0
[ 3213.409430][T10935] pgdeactivate 783
[ 3213.409430][T10935] pglazyfree 0
[ 3213.409430][T10935] pglazyfreed 0
[ 3213.409430][T10935] zswpin 0
[ 3213.409430][T10935] zswpout 0
[ 3213.409430][T10935] thp_fault_alloc 0
[ 3213.811644][T10935] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=10935,uid=0
[ 3213.863028][T10935] Memory cgroup out of memory: Killed process 10935 (syz-executor.1) total-vm:54548kB, anon-rss:384kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000
05:07:54 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0x4)
05:07:54 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x0, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
ftruncate(0xffffffffffffffff, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:54 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:54 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:54 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x0, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:54 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x0, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3214.379406][ C1] net_ratelimit: 2343 callbacks suppressed
[ 3214.379426][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3214.384440][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3214.385599][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3214.397486][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3214.409909][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3214.421951][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3214.433295][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3214.445140][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3214.457659][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3214.469208][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
05:07:54 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:55 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, 0x0, 0x0)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:55 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x0, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:55 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x0, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
ftruncate(0xffffffffffffffff, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:55 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x0, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:56 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:59 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0x5)
05:07:59 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, 0x0, 0x0)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:59 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:59 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:59 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x0, 0x401, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:07:59 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3219.475725][ C1] net_ratelimit: 3372 callbacks suppressed
[ 3219.475738][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3219.493733][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3219.506390][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies.
[ 3219.516058][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies.
[ 3219.525702][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3219.537824][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3219.550603][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3219.562752][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
05:08:00 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0x6)
[ 3219.575306][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3219.587446][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
05:08:00 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x0, 0x1, 0x1, 0x6, 0x401, 0x7fffffff}}, 0xe8)
ftruncate(0xffffffffffffffff, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3220.005007][T11037] syz-executor.1 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000
[ 3220.018390][T11037] CPU: 1 PID: 11037 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3220.027120][T11037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3220.037190][T11037] Call Trace:
[ 3220.040464][T11037]
[ 3220.043388][T11037] dump_stack_lvl+0x136/0x150
[ 3220.048065][T11037] dump_header+0x10a/0xd70
[ 3220.052482][T11037] oom_kill_process+0x25d/0x600
[ 3220.057332][T11037] out_of_memory+0x35c/0x1660
[ 3220.062018][T11037] ? find_held_lock+0x2d/0x110
[ 3220.066795][T11037] ? oom_killer_disable+0x2b0/0x2b0
[ 3220.072001][T11037] ? rcu_read_unlock+0x9/0x60
[ 3220.076679][T11037] ? find_held_lock+0x2d/0x110
[ 3220.081455][T11037] mem_cgroup_out_of_memory+0x206/0x270
[ 3220.087004][T11037] ? mem_cgroup_margin+0x130/0x130
[ 3220.092113][T11037] ? lock_downgrade+0x690/0x690
[ 3220.096966][T11037] try_charge_memcg+0xf9b/0x13b0
[ 3220.101937][T11037] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3220.107939][T11037] ? get_mem_cgroup_from_objcg+0xa1/0x280
[ 3220.113704][T11037] ? lock_downgrade+0x690/0x690
[ 3220.118562][T11037] ? lock_downgrade+0x690/0x690
[ 3220.123453][T11037] __memcg_kmem_charge_page+0x16e/0x3c0
[ 3220.129002][T11037] __alloc_pages+0x1f3/0x4a0
[ 3220.133587][T11037] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170
[ 3220.140342][T11037] ? print_usage_bug.part.0+0x660/0x660
[ 3220.145903][T11037] ? find_held_lock+0x2d/0x110
[ 3220.150675][T11037] alloc_pages+0x1aa/0x270
[ 3220.155117][T11037] pte_alloc_one+0x1a/0x230
[ 3220.159645][T11037] __pte_alloc+0x6d/0x260
[ 3220.163979][T11037] ? pmd_install+0x160/0x160
[ 3220.168599][T11037] ? _raw_spin_unlock+0x28/0x40
[ 3220.173453][T11037] ? __pmd_alloc+0x30c/0x5d0
[ 3220.178039][T11037] __handle_mm_fault+0x3626/0x3e60
[ 3220.183152][T11037] ? vm_iomap_memory+0x190/0x190
[ 3220.188097][T11037] handle_mm_fault+0x2ba/0x9c0
[ 3220.192863][T11037] do_user_addr_fault+0x475/0x1230
[ 3220.197975][T11037] ? rcu_is_watching+0x12/0xb0
[ 3220.202756][T11037] exc_page_fault+0x98/0x170
[ 3220.207352][T11037] asm_exc_page_fault+0x26/0x30
[ 3220.212198][T11037] RIP: 0033:0x7f7b21a2bde9
[ 3220.216606][T11037] Code: 48 8b 04 24 48 85 c0 74 17 48 8b 54 24 18 48 0f ca 48 89 54 24 18 48 83 f8 01 0f 85 9b 02 00 00 48 8b 44 24 10 48 8b 54 24 18 <48> 89 10 e9 c2 fd ff ff 48 8b 44 24 10 0f b7 10 48 8b 04 24 48 85
[ 3220.236217][T11037] RSP: 002b:00007f7b21ccfb60 EFLAGS: 00010246
[ 3220.242312][T11037] RAX: 0000000020000280 RBX: 0000000000000000 RCX: 0000000000000000
[ 3220.250313][T11037] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00005555561b82e8
[ 3220.258317][T11037] RBP: 00007f7b21ccfc58 R08: 0000000000000000 R09: 0000000000000000
[ 3220.266312][T11037] R10: 00007f7b21600068 R11: 0000000000000246 R12: 0000000000311b64
[ 3220.274309][T11037] R13: 00007f7b21ccfc80 R14: 00007f7b21babf80 R15: 0000000000000032
[ 3220.282324][T11037]
05:08:01 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, 0x0, 0x0)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:01 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:01 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:01 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3220.929543][T11037] memory: usage 307148kB, limit 307200kB, failcnt 5172
[ 3220.938637][T11037] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3221.033154][T11037] Memory cgroup stats for /syz1:
[ 3221.035385][T11037] anon 143360
[ 3221.035385][T11037] file 225280
[ 3221.035385][T11037] kernel 314130432
[ 3221.035385][T11037] kernel_stack 65536
[ 3221.035385][T11037] pagetables 77824
[ 3221.035385][T11037] sec_pagetables 0
[ 3221.035385][T11037] percpu 5433440
[ 3221.035385][T11037] sock 0
[ 3221.035385][T11037] vmalloc 8192
[ 3221.035385][T11037] shmem 225280
[ 3221.035385][T11037] zswap 0
[ 3221.035385][T11037] zswapped 0
[ 3221.035385][T11037] file_mapped 225280
[ 3221.035385][T11037] file_dirty 0
[ 3221.035385][T11037] file_writeback 0
[ 3221.035385][T11037] swapcached 0
[ 3221.035385][T11037] anon_thp 0
[ 3221.035385][T11037] file_thp 0
[ 3221.035385][T11037] shmem_thp 0
[ 3221.035385][T11037] inactive_anon 0
[ 3221.035385][T11037] active_anon 368640
[ 3221.035385][T11037] inactive_file 0
[ 3221.035385][T11037] active_file 0
[ 3221.035385][T11037] unevictable 0
[ 3221.035385][T11037] slab_reclaimable 24768
[ 3221.035385][T11037] slab_unreclaimable 308484272
[ 3221.035385][T11037] slab 308509040
[ 3221.035385][T11037] workingset_refault_anon 0
[ 3221.035385][T11037] workingset_refault_file 0
[ 3221.035385][T11037] workingset_activate_anon 0
[ 3221.035385][T11037] workingset_activate_file 0
[ 3221.035385][T11037] workingset_restore_anon 0
[ 3221.035385][T11037] workingset_restore_file 0
[ 3221.035385][T11037] workingset_nodereclaim 0
[ 3221.035385][T11037] pgscan 0
[ 3221.035385][T11037] pgsteal 0
[ 3221.035385][T11037] pgscan_kswapd 0
[ 3221.035385][T11037] pgscan_direct 0
[ 3221.035385][T11037] pgscan_khugepaged 0
[ 3221.035385][T11037] pgsteal_kswapd 0
[ 3221.035385][T11037] pgsteal_direct 0
[ 3221.035385][T11037] pgsteal_khugepaged 0
[ 3221.035385][T11037] pgfault 646504
[ 3221.035385][T11037] pgmajfault 0
[ 3221.035385][T11037] pgrefill 0
[ 3221.035385][T11037] pgactivate 0
[ 3221.035385][T11037] pgdeactivate 783
[ 3221.035385][T11037] pglazyfree 0
[ 3221.035385][T11037] pglazyfreed 0
[ 3221.035385][T11037] zswpin 0
[ 3221.035385][T11037] zswpout 0
[ 3221.035385][T11037] thp_fault_alloc 0
05:08:02 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:02 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040), 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:02 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:02 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:02 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3222.202346][T11037] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=11037,uid=0
[ 3222.289857][T11037] Memory cgroup out of memory: Killed process 11037 (syz-executor.1) total-vm:54548kB, anon-rss:512kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:84kB oom_score_adj:1000
05:08:02 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:02 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0x7)
05:08:03 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040), 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:03 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0x8)
05:08:03 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:03 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3223.407973][T11086] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000
[ 3223.494905][T11086] CPU: 0 PID: 11086 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3223.503646][T11086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3223.513727][T11086] Call Trace:
[ 3223.517025][T11086]
[ 3223.519975][T11086] dump_stack_lvl+0x136/0x150
[ 3223.524692][T11086] dump_header+0x10a/0xd70
[ 3223.529152][T11086] oom_kill_process+0x25d/0x600
[ 3223.534042][T11086] out_of_memory+0x35c/0x1660
[ 3223.538758][T11086] ? find_held_lock+0x2d/0x110
[ 3223.543570][T11086] ? oom_killer_disable+0x2b0/0x2b0
[ 3223.548807][T11086] ? rcu_read_unlock+0x9/0x60
[ 3223.553520][T11086] ? find_held_lock+0x2d/0x110
[ 3223.558335][T11086] mem_cgroup_out_of_memory+0x206/0x270
[ 3223.563926][T11086] ? mem_cgroup_margin+0x130/0x130
[ 3223.569073][T11086] ? lock_downgrade+0x690/0x690
[ 3223.573974][T11086] try_charge_memcg+0xf9b/0x13b0
[ 3223.578948][T11086] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3223.584967][T11086] ? rcu_read_unlock+0x9/0x60
[ 3223.589684][T11086] ? lock_downgrade+0x690/0x690
[ 3223.594578][T11086] charge_memcg+0x90/0x3b0
[ 3223.599030][T11086] __mem_cgroup_charge+0x2b/0x90
[ 3223.603992][T11086] do_wp_page+0x8eb/0x3520
[ 3223.608434][T11086] ? lock_release+0x670/0x670
[ 3223.613144][T11086] ? finish_mkwrite_fault+0x3d0/0x3d0
[ 3223.618551][T11086] ? do_raw_spin_lock+0x124/0x2b0
[ 3223.623612][T11086] ? spin_bug+0x1c0/0x1c0
[ 3223.627972][T11086] ? lock_downgrade+0x690/0x690
[ 3223.632861][T11086] __handle_mm_fault+0x19a1/0x3e60
[ 3223.638016][T11086] ? vm_iomap_memory+0x190/0x190
[ 3223.643016][T11086] handle_mm_fault+0x2ba/0x9c0
[ 3223.647822][T11086] do_user_addr_fault+0x475/0x1230
[ 3223.652975][T11086] ? rcu_is_watching+0x12/0xb0
[ 3223.657779][T11086] exc_page_fault+0x98/0x170
[ 3223.662404][T11086] asm_exc_page_fault+0x26/0x30
[ 3223.667294][T11086] RIP: 0033:0x7f7b21a39610
[ 3223.671734][T11086] Code: fe ff 49 39 dc 75 eb 48 8b 44 24 18 89 28 48 83 c4 28 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 44 00 00 41 89 c5 e9 75 fe ff ff <43> 89 2c 84 e9 a3 fe ff ff 0f 1f 80 00 00 00 00 49 39 d4 74 70 48
[ 3223.691360][T11086] RSP: 002b:00007f7b21ccfac0 EFLAGS: 00010246
[ 3223.697427][T11086] RAX: 00000000152aab2b RBX: 00007f7b21bac018 RCX: 0000001b32920000
[ 3223.705395][T11086] RDX: 0000000000000000 RSI: 0000001b32920018 RDI: 000000000913af7c
[ 3223.713361][T11086] RBP: 00000000152aab2b R08: 0000000000000b2b R09: 00000000152aab2f
[ 3223.721326][T11086] R10: 00007f7b21ccfc80 R11: 0000000000000246 R12: 00007f7b21ba0000
[ 3223.729286][T11086] R13: 0000000000000001 R14: 000000000000001b R15: ffffffff81ea510c
[ 3223.737250][T11086] ? alloc_inode+0xc/0x230
[ 3223.741674][T11086]
05:08:04 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040), 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:04 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:04 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3224.534556][ C1] net_ratelimit: 2112 callbacks suppressed
[ 3224.534569][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3224.552564][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3224.565042][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3224.577141][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3224.589618][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3224.601698][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3224.614131][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3224.626207][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3224.638682][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3224.650780][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
05:08:05 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:05 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:05 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:05 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:05 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(0xffffffffffffffff, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:05 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3225.540691][T11086] memory: usage 307116kB, limit 307200kB, failcnt 5297
[ 3225.547831][T11086] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3225.600729][T11086] Memory cgroup stats for /syz1:
[ 3225.600888][T11086] anon 139264
[ 3225.600888][T11086] file 225280
[ 3225.600888][T11086] kernel 314122240
[ 3225.600888][T11086] kernel_stack 65536
[ 3225.600888][T11086] pagetables 73728
[ 3225.600888][T11086] sec_pagetables 0
[ 3225.600888][T11086] percpu 5433440
[ 3225.600888][T11086] sock 0
[ 3225.600888][T11086] vmalloc 8192
[ 3225.600888][T11086] shmem 225280
[ 3225.600888][T11086] zswap 0
[ 3225.600888][T11086] zswapped 0
[ 3225.600888][T11086] file_mapped 225280
[ 3225.600888][T11086] file_dirty 0
[ 3225.600888][T11086] file_writeback 0
[ 3225.600888][T11086] swapcached 0
[ 3225.600888][T11086] anon_thp 0
[ 3225.600888][T11086] file_thp 0
[ 3225.600888][T11086] shmem_thp 0
[ 3225.600888][T11086] inactive_anon 0
[ 3225.600888][T11086] active_anon 364544
[ 3225.600888][T11086] inactive_file 0
[ 3225.600888][T11086] active_file 0
[ 3225.600888][T11086] unevictable 0
[ 3225.600888][T11086] slab_reclaimable 19752
[ 3225.600888][T11086] slab_unreclaimable 308488328
[ 3225.600888][T11086] slab 308508080
[ 3225.600888][T11086] workingset_refault_anon 0
[ 3225.600888][T11086] workingset_refault_file 0
[ 3225.600888][T11086] workingset_activate_anon 0
[ 3225.600888][T11086] workingset_activate_file 0
[ 3225.600888][T11086] workingset_restore_anon 0
[ 3225.600888][T11086] workingset_restore_file 0
[ 3225.600888][T11086] workingset_nodereclaim 0
[ 3225.600888][T11086] pgscan 0
[ 3225.600888][T11086] pgsteal 0
[ 3225.600888][T11086] pgscan_kswapd 0
[ 3225.600888][T11086] pgscan_direct 0
[ 3225.600888][T11086] pgscan_khugepaged 0
[ 3225.600888][T11086] pgsteal_kswapd 0
[ 3225.600888][T11086] pgsteal_direct 0
[ 3225.600888][T11086] pgsteal_khugepaged 0
[ 3225.600888][T11086] pgfault 646620
[ 3225.600888][T11086] pgmajfault 0
[ 3225.600888][T11086] pgrefill 0
[ 3225.600888][T11086] pgactivate 0
[ 3225.600888][T11086] pgdeactivate 783
[ 3225.600888][T11086] pglazyfree 0
[ 3225.600888][T11086] pglazyfreed 0
[ 3225.600888][T11086] zswpin 0
[ 3225.600888][T11086] zswpout 0
[ 3225.600888][T11086] thp_fault_alloc 0
[ 3226.547317][T11086] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=11086,uid=0
[ 3226.621844][T11086] Memory cgroup out of memory: Killed process 11086 (syz-executor.1) total-vm:54548kB, anon-rss:512kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000
05:08:07 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0x9)
05:08:07 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:07 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(0xffffffffffffffff, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:07 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:07 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:07 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(0x0, 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:07 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0xa)
05:08:07 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
sendto$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(0xffffffffffffffff, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3227.206458][T11149] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000
[ 3227.380315][T11149] CPU: 0 PID: 11149 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3227.389028][T11149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3227.399088][T11149] Call Trace:
[ 3227.402361][T11149]
[ 3227.405284][T11149] dump_stack_lvl+0x136/0x150
[ 3227.409965][T11149] dump_header+0x10a/0xd70
[ 3227.414440][T11149] oom_kill_process+0x25d/0x600
[ 3227.419304][T11149] out_of_memory+0x35c/0x1660
[ 3227.423979][T11149] ? find_held_lock+0x2d/0x110
[ 3227.428746][T11149] ? oom_killer_disable+0x2b0/0x2b0
[ 3227.433974][T11149] ? rcu_read_unlock+0x9/0x60
[ 3227.438659][T11149] ? find_held_lock+0x2d/0x110
[ 3227.443427][T11149] mem_cgroup_out_of_memory+0x206/0x270
[ 3227.448975][T11149] ? mem_cgroup_margin+0x130/0x130
[ 3227.454086][T11149] ? lock_downgrade+0x690/0x690
[ 3227.458937][T11149] try_charge_memcg+0xf9b/0x13b0
[ 3227.463868][T11149] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3227.469859][T11149] ? get_mem_cgroup_from_objcg+0xa1/0x280
[ 3227.475589][T11149] ? lock_downgrade+0x690/0x690
[ 3227.480463][T11149] ? lock_downgrade+0x690/0x690
[ 3227.485316][T11149] __memcg_kmem_charge_page+0x16e/0x3c0
[ 3227.490859][T11149] memcg_charge_kernel_stack.part.0+0x6c/0x150
[ 3227.497012][T11149] copy_process+0x13a7/0x7590
[ 3227.501687][T11149] ? __lock_acquire+0xbc5/0x5d40
[ 3227.506621][T11149] ? __cleanup_sighand+0xb0/0xb0
[ 3227.511553][T11149] ? lockdep_hardirqs_on_prepare+0x410/0x410
[ 3227.517526][T11149] ? psi_memstall_leave+0x174/0x250
[ 3227.522738][T11149] ? lock_downgrade+0x690/0x690
[ 3227.527582][T11149] kernel_clone+0xeb/0x890
[ 3227.531995][T11149] ? create_io_thread+0xf0/0xf0
[ 3227.536843][T11149] ? percpu_ref_put_many.constprop.0+0x6a/0x1b0
[ 3227.543079][T11149] ? lock_downgrade+0x690/0x690
[ 3227.547929][T11149] __do_sys_clone+0xba/0x100
[ 3227.552512][T11149] ? kernel_clone+0x890/0x890
[ 3227.557195][T11149] ? syscall_enter_from_user_mode+0x26/0x80
[ 3227.563086][T11149] do_syscall_64+0x39/0xb0
[ 3227.567503][T11149] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 3227.573392][T11149] RIP: 0033:0x7f7b21a8d591
[ 3227.577798][T11149] Code: 48 85 ff 74 3d 48 85 f6 74 38 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 7c 13 74 01 c3 31 ed 58 5f ff d0 48 89 c7 b8 3c 00 00 00
[ 3227.597416][T11149] RSP: 002b:00007f7b21ccfa68 EFLAGS: 00000206 ORIG_RAX: 0000000000000038
[ 3227.605837][T11149] RAX: ffffffffffffffda RBX: 00007f7b2274b700 RCX: 00007f7b21a8d591
[ 3227.613799][T11149] RDX: 00007f7b2274b9d0 RSI: 00007f7b2274b2f0 RDI: 00000000003d0f00
[ 3227.621758][T11149] RBP: 00007f7b21ccfcb0 R08: 00007f7b2274b700 R09: 00007f7b2274b700
[ 3227.629719][T11149] R10: 00007f7b2274b9d0 R11: 0000000000000206 R12: 00007f7b21ccfb1e
[ 3227.637680][T11149] R13: 00007f7b21ccfb1f R14: 00007f7b2274b300 R15: 0000000000022000
[ 3227.645651][T11149]
05:08:08 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:09 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:09 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
sendto$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(0xffffffffffffffff, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:09 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(0x0, 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3228.691209][T11149] memory: usage 307200kB, limit 307200kB, failcnt 5411
[ 3228.698135][T11149] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
05:08:09 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(0xffffffffffffffff, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3228.808473][T11149] Memory cgroup stats for /syz1:
[ 3228.810834][T11149] anon 114688
[ 3228.810834][T11149] file 225280
[ 3228.810834][T11149] kernel 314232832
[ 3228.810834][T11149] kernel_stack 65536
[ 3228.810834][T11149] pagetables 81920
[ 3228.810834][T11149] sec_pagetables 0
[ 3228.810834][T11149] percpu 5433504
[ 3228.810834][T11149] sock 0
[ 3228.810834][T11149] vmalloc 8192
[ 3228.810834][T11149] shmem 225280
[ 3228.810834][T11149] zswap 0
[ 3228.810834][T11149] zswapped 0
[ 3228.810834][T11149] file_mapped 225280
[ 3228.810834][T11149] file_dirty 0
[ 3228.810834][T11149] file_writeback 0
[ 3228.810834][T11149] swapcached 0
[ 3228.810834][T11149] anon_thp 0
[ 3228.810834][T11149] file_thp 0
[ 3228.810834][T11149] shmem_thp 0
[ 3228.810834][T11149] inactive_anon 0
[ 3228.810834][T11149] active_anon 339968
[ 3228.810834][T11149] inactive_file 0
[ 3228.810834][T11149] active_file 0
[ 3228.810834][T11149] unevictable 0
[ 3228.810834][T11149] slab_reclaimable 45680
[ 3228.810834][T11149] slab_unreclaimable 308551160
[ 3228.810834][T11149] slab 308596840
[ 3228.810834][T11149] workingset_refault_anon 0
[ 3228.810834][T11149] workingset_refault_file 0
[ 3228.810834][T11149] workingset_activate_anon 0
[ 3228.810834][T11149] workingset_activate_file 0
[ 3228.810834][T11149] workingset_restore_anon 0
[ 3228.810834][T11149] workingset_restore_file 0
[ 3228.810834][T11149] workingset_nodereclaim 0
[ 3228.810834][T11149] pgscan 0
[ 3228.810834][T11149] pgsteal 0
[ 3228.810834][T11149] pgscan_kswapd 0
[ 3228.810834][T11149] pgscan_direct 0
[ 3228.810834][T11149] pgscan_khugepaged 0
[ 3228.810834][T11149] pgsteal_kswapd 0
[ 3228.810834][T11149] pgsteal_direct 0
[ 3228.810834][T11149] pgsteal_khugepaged 0
[ 3228.810834][T11149] pgfault 646718
[ 3228.810834][T11149] pgmajfault 0
[ 3228.810834][T11149] pgrefill 0
[ 3228.810834][T11149] pgactivate 0
[ 3228.810834][T11149] pgdeactivate 783
[ 3228.810834][T11149] pglazyfree 0
[ 3228.810834][T11149] pglazyfreed 0
[ 3228.810834][T11149] zswpin 0
[ 3228.810834][T11149] zswpout 0
[ 3228.810834][T11149] thp_fault_alloc 0
[ 3229.567935][ C1] net_ratelimit: 2812 callbacks suppressed
[ 3229.567948][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3229.586003][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3229.598811][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3229.610934][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3229.623386][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3229.635475][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3229.647911][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3229.660051][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3229.672508][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3229.684584][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
05:08:10 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
sendto$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(0xffffffffffffffff, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:10 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:10 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(0x0, 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:10 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040), 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:10 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3231.479731][T11149] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=11149,uid=0
[ 3231.569516][T11149] Memory cgroup out of memory: Killed process 11149 (syz-executor.1) total-vm:54680kB, anon-rss:384kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:88kB oom_score_adj:1000
05:08:12 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0xb)
05:08:12 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:12 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(0xffffffffffffffff, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:12 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(0xffffffffffffffff, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:12 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(0xffffffffffffffff, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:12 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3231.876540][T11203] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000
[ 3231.921823][T11203] CPU: 1 PID: 11203 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3231.930524][T11203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3231.940580][T11203] Call Trace:
[ 3231.943870][T11203]
[ 3231.946809][T11203] dump_stack_lvl+0x136/0x150
[ 3231.951506][T11203] dump_header+0x10a/0xd70
[ 3231.955923][T11203] oom_kill_process+0x25d/0x600
[ 3231.960772][T11203] out_of_memory+0x35c/0x1660
[ 3231.965445][T11203] ? find_held_lock+0x2d/0x110
[ 3231.970224][T11203] ? oom_killer_disable+0x2b0/0x2b0
[ 3231.975415][T11203] ? rcu_read_unlock+0x9/0x60
[ 3231.980098][T11203] ? find_held_lock+0x2d/0x110
[ 3231.984870][T11203] mem_cgroup_out_of_memory+0x206/0x270
[ 3231.990414][T11203] ? mem_cgroup_margin+0x130/0x130
[ 3231.995519][T11203] ? lock_downgrade+0x690/0x690
[ 3232.000388][T11203] try_charge_memcg+0xf9b/0x13b0
[ 3232.005338][T11203] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3232.011312][T11203] ? get_mem_cgroup_from_objcg+0xa1/0x280
[ 3232.017031][T11203] ? lock_downgrade+0x690/0x690
[ 3232.021876][T11203] ? lock_downgrade+0x690/0x690
[ 3232.026742][T11203] __memcg_kmem_charge_page+0x16e/0x3c0
[ 3232.032288][T11203] memcg_charge_kernel_stack.part.0+0x6c/0x150
[ 3232.038456][T11203] copy_process+0x4e3/0x7590
[ 3232.043072][T11203] ? __lock_acquire+0xbc5/0x5d40
[ 3232.048020][T11203] ? __cleanup_sighand+0xb0/0xb0
[ 3232.052956][T11203] ? lockdep_hardirqs_on_prepare+0x410/0x410
[ 3232.058938][T11203] ? psi_memstall_leave+0x174/0x250
[ 3232.064151][T11203] ? lock_downgrade+0x690/0x690
[ 3232.069017][T11203] kernel_clone+0xeb/0x890
[ 3232.073448][T11203] ? create_io_thread+0xf0/0xf0
[ 3232.078323][T11203] ? percpu_ref_put_many.constprop.0+0x6a/0x1b0
[ 3232.084564][T11203] ? lock_downgrade+0x690/0x690
[ 3232.089417][T11203] __do_sys_clone+0xba/0x100
[ 3232.094004][T11203] ? kernel_clone+0x890/0x890
[ 3232.098688][T11203] ? syscall_enter_from_user_mode+0x26/0x80
[ 3232.104584][T11203] do_syscall_64+0x39/0xb0
[ 3232.109003][T11203] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 3232.114894][T11203] RIP: 0033:0x7f7b21a8d591
[ 3232.119301][T11203] Code: 48 85 ff 74 3d 48 85 f6 74 38 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 7c 13 74 01 c3 31 ed 58 5f ff d0 48 89 c7 b8 3c 00 00 00
[ 3232.138903][T11203] RSP: 002b:00007f7b21ccfa68 EFLAGS: 00000206 ORIG_RAX: 0000000000000038
[ 3232.147312][T11203] RAX: ffffffffffffffda RBX: 00007f7b2276c700 RCX: 00007f7b21a8d591
[ 3232.155278][T11203] RDX: 00007f7b2276c9d0 RSI: 00007f7b2276c2f0 RDI: 00000000003d0f00
[ 3232.163239][T11203] RBP: 00007f7b21ccfcb0 R08: 00007f7b2276c700 R09: 00007f7b2276c700
[ 3232.171202][T11203] R10: 00007f7b2276c9d0 R11: 0000000000000206 R12: 00007f7b21ccfb1e
[ 3232.179163][T11203] R13: 00007f7b21ccfb1f R14: 00007f7b2276c300 R15: 0000000000022000
[ 3232.187133][T11203]
05:08:12 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(0xffffffffffffffff, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:13 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:13 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(0xffffffffffffffff, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:13 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:13 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:14 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3233.647952][T11203] memory: usage 307128kB, limit 307200kB, failcnt 5496
[ 3233.655387][T11203] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3233.665972][T11203] Memory cgroup stats for /syz1:
[ 3233.666130][T11203] anon 98304
[ 3233.666130][T11203] file 225280
[ 3233.666130][T11203] kernel 314175488
[ 3233.666130][T11203] kernel_stack 32768
[ 3233.666130][T11203] pagetables 73728
[ 3233.666130][T11203] sec_pagetables 0
[ 3233.666130][T11203] percpu 5433504
[ 3233.666130][T11203] sock 0
[ 3233.666130][T11203] vmalloc 8192
[ 3233.666130][T11203] shmem 225280
[ 3233.666130][T11203] zswap 0
[ 3233.666130][T11203] zswapped 0
[ 3233.666130][T11203] file_mapped 225280
[ 3233.666130][T11203] file_dirty 0
[ 3233.666130][T11203] file_writeback 0
[ 3233.666130][T11203] swapcached 0
[ 3233.666130][T11203] anon_thp 0
[ 3233.666130][T11203] file_thp 0
[ 3233.666130][T11203] shmem_thp 0
[ 3233.666130][T11203] inactive_anon 0
[ 3233.666130][T11203] active_anon 323584
[ 3233.666130][T11203] inactive_file 0
[ 3233.666130][T11203] active_file 0
[ 3233.666130][T11203] unevictable 0
[ 3233.666130][T11203] slab_reclaimable 37536
[ 3233.666130][T11203] slab_unreclaimable 308528512
[ 3233.666130][T11203] slab 308566048
[ 3233.666130][T11203] workingset_refault_anon 0
[ 3233.666130][T11203] workingset_refault_file 0
[ 3233.666130][T11203] workingset_activate_anon 0
[ 3233.666130][T11203] workingset_activate_file 0
[ 3233.666130][T11203] workingset_restore_anon 0
[ 3233.666130][T11203] workingset_restore_file 0
[ 3233.666130][T11203] workingset_nodereclaim 0
[ 3233.666130][T11203] pgscan 0
[ 3233.666130][T11203] pgsteal 0
[ 3233.666130][T11203] pgscan_kswapd 0
[ 3233.666130][T11203] pgscan_direct 0
[ 3233.666130][T11203] pgscan_khugepaged 0
[ 3233.666130][T11203] pgsteal_kswapd 0
[ 3233.666130][T11203] pgsteal_direct 0
[ 3233.666130][T11203] pgsteal_khugepaged 0
[ 3233.666130][T11203] pgfault 646756
[ 3233.666130][T11203] pgmajfault 0
[ 3233.666130][T11203] pgrefill 0
[ 3233.666130][T11203] pgactivate 0
[ 3233.666130][T11203] pgdeactivate 783
[ 3233.666130][T11203] pglazyfree 0
[ 3233.666130][T11203] pglazyfreed 0
[ 3233.666130][T11203] zswpin 0
[ 3233.666130][T11203] zswpout 0
[ 3233.666130][T11203] thp_fault_alloc 0
[ 3234.510774][T11203] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=11203,uid=0
[ 3234.563958][T11203] Memory cgroup out of memory: Killed process 11203 (syz-executor.1) total-vm:54548kB, anon-rss:384kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000
[ 3234.597177][ C0] net_ratelimit: 2356 callbacks suppressed
[ 3234.597191][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3234.615338][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3234.627523][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3234.639668][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3234.652184][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3234.664390][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3234.676541][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3234.688694][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3234.701167][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
05:08:15 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0xc)
05:08:15 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, 0x0, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3234.713385][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
05:08:15 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0xe)
05:08:15 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:15 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:15 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(0xffffffffffffffff, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:15 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(0xffffffffffffffff, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3235.247203][T11242] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=1, oom_score_adj=1000
[ 3235.275339][T11242] CPU: 0 PID: 11242 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3235.284051][T11242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3235.294095][T11242] Call Trace:
[ 3235.297369][T11242]
[ 3235.300294][T11242] dump_stack_lvl+0x136/0x150
[ 3235.304967][T11242] dump_header+0x10a/0xd70
[ 3235.309380][T11242] oom_kill_process+0x25d/0x600
[ 3235.314227][T11242] out_of_memory+0x35c/0x1660
[ 3235.318910][T11242] ? find_held_lock+0x2d/0x110
[ 3235.323676][T11242] ? oom_killer_disable+0x2b0/0x2b0
[ 3235.328871][T11242] ? rcu_read_unlock+0x9/0x60
[ 3235.333558][T11242] ? find_held_lock+0x2d/0x110
[ 3235.338338][T11242] mem_cgroup_out_of_memory+0x206/0x270
[ 3235.343882][T11242] ? mem_cgroup_margin+0x130/0x130
[ 3235.348988][T11242] ? lock_downgrade+0x690/0x690
[ 3235.353838][T11242] try_charge_memcg+0xf9b/0x13b0
[ 3235.358770][T11242] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3235.364741][T11242] ? get_mem_cgroup_from_objcg+0xa1/0x280
[ 3235.370458][T11242] ? lock_downgrade+0x690/0x690
[ 3235.375318][T11242] ? lock_downgrade+0x690/0x690
[ 3235.380158][T11242] ? rcu_read_unlock+0x9/0x60
[ 3235.384833][T11242] obj_cgroup_charge+0x2af/0x5e0
[ 3235.389762][T11242] ? copy_process+0x3aa/0x7590
[ 3235.394517][T11242] kmem_cache_alloc_node+0xa8/0x3e0
[ 3235.399718][T11242] copy_process+0x3aa/0x7590
[ 3235.404304][T11242] ? __lock_acquire+0xbc5/0x5d40
[ 3235.409243][T11242] ? __cleanup_sighand+0xb0/0xb0
[ 3235.414175][T11242] ? lockdep_hardirqs_on_prepare+0x410/0x410
[ 3235.420165][T11242] ? psi_memstall_leave+0x174/0x250
[ 3235.425362][T11242] ? lock_downgrade+0x690/0x690
[ 3235.430209][T11242] kernel_clone+0xeb/0x890
[ 3235.434639][T11242] ? create_io_thread+0xf0/0xf0
[ 3235.439483][T11242] ? percpu_ref_put_many.constprop.0+0x6a/0x1b0
[ 3235.445722][T11242] ? lock_downgrade+0x690/0x690
[ 3235.450589][T11242] __do_sys_clone+0xba/0x100
[ 3235.455173][T11242] ? kernel_clone+0x890/0x890
[ 3235.459852][T11242] ? syscall_enter_from_user_mode+0x26/0x80
[ 3235.465741][T11242] do_syscall_64+0x39/0xb0
[ 3235.470158][T11242] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 3235.476045][T11242] RIP: 0033:0x7f7b21a8d591
[ 3235.480451][T11242] Code: 48 85 ff 74 3d 48 85 f6 74 38 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 7c 13 74 01 c3 31 ed 58 5f ff d0 48 89 c7 b8 3c 00 00 00
[ 3235.500047][T11242] RSP: 002b:00007f7b21ccfa68 EFLAGS: 00000206 ORIG_RAX: 0000000000000038
[ 3235.508450][T11242] RAX: ffffffffffffffda RBX: 00007f7b2274b700 RCX: 00007f7b21a8d591
[ 3235.516426][T11242] RDX: 00007f7b2274b9d0 RSI: 00007f7b2274b2f0 RDI: 00000000003d0f00
[ 3235.524387][T11242] RBP: 00007f7b21ccfcb0 R08: 00007f7b2274b700 R09: 00007f7b2274b700
[ 3235.532348][T11242] R10: 00007f7b2274b9d0 R11: 0000000000000206 R12: 00007f7b21ccfb1e
[ 3235.540311][T11242] R13: 00007f7b21ccfb1f R14: 00007f7b2274b300 R15: 0000000000022000
[ 3235.548285][T11242]
05:08:16 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, 0x0, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:16 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(0xffffffffffffffff, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:16 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, 0xffffffffffffffff, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:17 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x0)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:17 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3236.743929][T11242] memory: usage 307188kB, limit 307200kB, failcnt 5626
[ 3236.757157][T11242] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3236.764255][T11242] Memory cgroup stats for /syz1:
[ 3236.764482][T11242] anon 114688
[ 3236.764482][T11242] file 225280
[ 3236.764482][T11242] kernel 314220544
[ 3236.764482][T11242] kernel_stack 65536
[ 3236.764482][T11242] pagetables 81920
[ 3236.764482][T11242] sec_pagetables 0
[ 3236.764482][T11242] percpu 5433568
[ 3236.764482][T11242] sock 0
[ 3236.764482][T11242] vmalloc 8192
[ 3236.764482][T11242] shmem 225280
[ 3236.764482][T11242] zswap 0
[ 3236.764482][T11242] zswapped 0
[ 3236.764482][T11242] file_mapped 225280
[ 3236.764482][T11242] file_dirty 0
[ 3236.764482][T11242] file_writeback 0
[ 3236.764482][T11242] swapcached 0
[ 3236.764482][T11242] anon_thp 0
[ 3236.764482][T11242] file_thp 0
[ 3236.764482][T11242] shmem_thp 0
[ 3236.764482][T11242] inactive_anon 0
[ 3236.764482][T11242] active_anon 339968
[ 3236.764482][T11242] inactive_file 0
[ 3236.764482][T11242] active_file 0
[ 3236.764482][T11242] unevictable 0
[ 3236.764482][T11242] slab_reclaimable 38304
[ 3236.764482][T11242] slab_unreclaimable 308546456
[ 3236.764482][T11242] slab 308584760
[ 3236.764482][T11242] workingset_refault_anon 0
[ 3236.764482][T11242] workingset_refault_file 0
[ 3236.764482][T11242] workingset_activate_anon 0
[ 3236.764482][T11242] workingset_activate_file 0
[ 3236.764482][T11242] workingset_restore_anon 0
[ 3236.764482][T11242] workingset_restore_file 0
[ 3236.764482][T11242] workingset_nodereclaim 0
[ 3236.764482][T11242] pgscan 0
[ 3236.764482][T11242] pgsteal 0
[ 3236.764482][T11242] pgscan_kswapd 0
[ 3236.764482][T11242] pgscan_direct 0
[ 3236.764482][T11242] pgscan_khugepaged 0
[ 3236.764482][T11242] pgsteal_kswapd 0
[ 3236.764482][T11242] pgsteal_direct 0
[ 3236.764482][T11242] pgsteal_khugepaged 0
[ 3236.764482][T11242] pgfault 646854
[ 3236.764482][T11242] pgmajfault 0
[ 3236.764482][T11242] pgrefill 0
[ 3236.764482][T11242] pgactivate 0
[ 3236.764482][T11242] pgdeactivate 783
[ 3236.764482][T11242] pglazyfree 0
[ 3236.764482][T11242] pglazyfreed 0
[ 3236.764482][T11242] zswpin 0
[ 3236.764482][T11242] zswpout 0
[ 3236.764482][T11242] thp_fault_alloc 0
05:08:17 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0xc)
05:08:17 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, 0x0, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3237.473529][T11242] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=11242,uid=0
[ 3238.800150][T11242] Memory cgroup out of memory: Killed process 11242 (syz-executor.1) total-vm:54680kB, anon-rss:384kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:88kB oom_score_adj:1000
05:08:19 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0xf)
05:08:19 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:19 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, 0xffffffffffffffff, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:19 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:19 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x0)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:19 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:19 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0x10)
05:08:19 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:19 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3239.613125][ C0] net_ratelimit: 2289 callbacks suppressed
[ 3239.613139][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3239.631253][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3239.643461][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3239.655619][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3239.668122][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3239.680321][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3239.692462][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3239.704551][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3239.717002][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3239.729183][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3239.753036][T11307] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000
[ 3239.878957][T11307] CPU: 1 PID: 11307 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3239.887705][T11307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3239.897791][T11307] Call Trace:
[ 3239.901094][T11307]
[ 3239.904044][T11307] dump_stack_lvl+0x136/0x150
[ 3239.908755][T11307] dump_header+0x10a/0xd70
[ 3239.913208][T11307] oom_kill_process+0x25d/0x600
[ 3239.918098][T11307] out_of_memory+0x35c/0x1660
[ 3239.922815][T11307] ? find_held_lock+0x2d/0x110
[ 3239.927623][T11307] ? oom_killer_disable+0x2b0/0x2b0
[ 3239.932861][T11307] ? rcu_read_unlock+0x9/0x60
[ 3239.937573][T11307] ? find_held_lock+0x2d/0x110
[ 3239.942386][T11307] mem_cgroup_out_of_memory+0x206/0x270
[ 3239.947977][T11307] ? mem_cgroup_margin+0x130/0x130
[ 3239.953123][T11307] ? lock_downgrade+0x690/0x690
[ 3239.958023][T11307] try_charge_memcg+0xf9b/0x13b0
[ 3239.962998][T11307] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3239.969008][T11307] ? get_mem_cgroup_from_objcg+0xa1/0x280
[ 3239.974772][T11307] ? lock_downgrade+0x690/0x690
[ 3239.979656][T11307] ? lock_downgrade+0x690/0x690
[ 3239.984553][T11307] __memcg_kmem_charge_page+0x16e/0x3c0
[ 3239.990123][T11307] memcg_charge_kernel_stack.part.0+0x6c/0x150
[ 3239.996301][T11307] copy_process+0x4e3/0x7590
[ 3240.000893][T11307] ? __lock_acquire+0xbc5/0x5d40
[ 3240.005830][T11307] ? __cleanup_sighand+0xb0/0xb0
[ 3240.010764][T11307] ? lockdep_hardirqs_on_prepare+0x410/0x410
[ 3240.016751][T11307] ? psi_memstall_leave+0x174/0x250
[ 3240.021972][T11307] ? lock_downgrade+0x690/0x690
[ 3240.026827][T11307] kernel_clone+0xeb/0x890
[ 3240.031258][T11307] ? create_io_thread+0xf0/0xf0
[ 3240.036123][T11307] ? percpu_ref_put_many.constprop.0+0x6a/0x1b0
[ 3240.042373][T11307] ? lock_downgrade+0x690/0x690
[ 3240.047268][T11307] __do_sys_clone+0xba/0x100
[ 3240.051860][T11307] ? kernel_clone+0x890/0x890
[ 3240.056555][T11307] ? syscall_enter_from_user_mode+0x26/0x80
[ 3240.062493][T11307] do_syscall_64+0x39/0xb0
[ 3240.066924][T11307] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 3240.072825][T11307] RIP: 0033:0x7f7b21a8d591
[ 3240.077234][T11307] Code: 48 85 ff 74 3d 48 85 f6 74 38 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 7c 13 74 01 c3 31 ed 58 5f ff d0 48 89 c7 b8 3c 00 00 00
[ 3240.096854][T11307] RSP: 002b:00007f7b21ccfa68 EFLAGS: 00000206 ORIG_RAX: 0000000000000038
[ 3240.105291][T11307] RAX: ffffffffffffffda RBX: 00007f7b2274b700 RCX: 00007f7b21a8d591
[ 3240.113260][T11307] RDX: 00007f7b2274b9d0 RSI: 00007f7b2274b2f0 RDI: 00000000003d0f00
[ 3240.121224][T11307] RBP: 00007f7b21ccfcb0 R08: 00007f7b2274b700 R09: 00007f7b2274b700
05:08:20 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, 0xffffffffffffffff, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3240.129197][T11307] R10: 00007f7b2274b9d0 R11: 0000000000000206 R12: 00007f7b21ccfb1e
[ 3240.137177][T11307] R13: 00007f7b21ccfb1f R14: 00007f7b2274b300 R15: 0000000000022000
[ 3240.145152][T11307]
05:08:20 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x0)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:20 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:21 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:21 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:21 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
getpid()
r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, r0, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:21 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x0, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:21 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:22 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3242.668095][T11307] memory: usage 307164kB, limit 307200kB, failcnt 5758
[ 3242.697425][T11307] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3242.721851][T11307] Memory cgroup stats for /syz1:
[ 3242.722099][T11307] anon 118784
[ 3242.722099][T11307] file 225280
[ 3242.722099][T11307] kernel 314191872
[ 3242.722099][T11307] kernel_stack 32768
[ 3242.722099][T11307] pagetables 81920
[ 3242.722099][T11307] sec_pagetables 0
[ 3242.722099][T11307] percpu 5433504
[ 3242.722099][T11307] sock 0
[ 3242.722099][T11307] vmalloc 8192
[ 3242.722099][T11307] shmem 225280
[ 3242.722099][T11307] zswap 0
[ 3242.722099][T11307] zswapped 0
[ 3242.722099][T11307] file_mapped 225280
[ 3242.722099][T11307] file_dirty 0
[ 3242.722099][T11307] file_writeback 0
[ 3242.722099][T11307] swapcached 0
[ 3242.722099][T11307] anon_thp 0
[ 3242.722099][T11307] file_thp 0
[ 3242.722099][T11307] shmem_thp 0
[ 3242.722099][T11307] inactive_anon 0
[ 3242.722099][T11307] active_anon 339968
[ 3242.722099][T11307] inactive_file 0
[ 3242.722099][T11307] active_file 0
[ 3242.722099][T11307] unevictable 0
[ 3242.722099][T11307] slab_reclaimable 45680
[ 3242.722099][T11307] slab_unreclaimable 308550856
[ 3242.722099][T11307] slab 308596536
[ 3242.722099][T11307] workingset_refault_anon 0
[ 3242.722099][T11307] workingset_refault_file 0
[ 3242.722099][T11307] workingset_activate_anon 0
[ 3242.722099][T11307] workingset_activate_file 0
[ 3242.722099][T11307] workingset_restore_anon 0
[ 3242.722099][T11307] workingset_restore_file 0
[ 3242.722099][T11307] workingset_nodereclaim 0
[ 3242.722099][T11307] pgscan 0
[ 3242.722099][T11307] pgsteal 0
[ 3242.722099][T11307] pgscan_kswapd 0
[ 3242.722099][T11307] pgscan_direct 0
[ 3242.722099][T11307] pgscan_khugepaged 0
[ 3242.722099][T11307] pgsteal_kswapd 0
[ 3242.722099][T11307] pgsteal_direct 0
[ 3242.722099][T11307] pgsteal_khugepaged 0
[ 3242.722099][T11307] pgfault 646954
[ 3242.722099][T11307] pgmajfault 0
[ 3242.722099][T11307] pgrefill 0
[ 3242.722099][T11307] pgactivate 0
[ 3242.722099][T11307] pgdeactivate 783
[ 3242.722099][T11307] pglazyfree 0
[ 3242.722099][T11307] pglazyfreed 0
[ 3242.722099][T11307] zswpin 0
[ 3242.722099][T11307] zswpout 0
[ 3242.722099][T11307] thp_fault_alloc 0
[ 3243.438330][T11307] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=11307,uid=0
[ 3243.509121][T11307] Memory cgroup out of memory: Killed process 11307 (syz-executor.1) total-vm:54680kB, anon-rss:384kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:88kB oom_score_adj:1000
05:08:24 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0x11)
05:08:24 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(0xffffffffffffffff, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:24 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
getpid()
r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, r0, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:24 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x0, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:24 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x0)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:24 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:24 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
getpid()
r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, r0, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:24 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
process_vm_readv(0x0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, r0, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:24 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x0, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3244.258854][T11359] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000
[ 3244.337377][T11359] CPU: 0 PID: 11359 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3244.346123][T11359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3244.356217][T11359] Call Trace:
[ 3244.359517][T11359]
[ 3244.362477][T11359] dump_stack_lvl+0x136/0x150
[ 3244.367191][T11359] dump_header+0x10a/0xd70
[ 3244.371651][T11359] oom_kill_process+0x25d/0x600
[ 3244.376550][T11359] out_of_memory+0x35c/0x1660
[ 3244.381270][T11359] ? find_held_lock+0x2d/0x110
[ 3244.386082][T11359] ? oom_killer_disable+0x2b0/0x2b0
[ 3244.391317][T11359] ? rcu_read_unlock+0x9/0x60
[ 3244.396023][T11359] ? find_held_lock+0x2d/0x110
[ 3244.400792][T11359] mem_cgroup_out_of_memory+0x206/0x270
[ 3244.406344][T11359] ? mem_cgroup_margin+0x130/0x130
[ 3244.411472][T11359] ? lock_downgrade+0x690/0x690
[ 3244.416326][T11359] try_charge_memcg+0xf9b/0x13b0
[ 3244.421260][T11359] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3244.427237][T11359] ? rcu_read_unlock+0x9/0x60
[ 3244.431910][T11359] ? lock_downgrade+0x690/0x690
[ 3244.436759][T11359] charge_memcg+0x90/0x3b0
[ 3244.441169][T11359] __mem_cgroup_charge+0x2b/0x90
[ 3244.446119][T11359] do_wp_page+0x8eb/0x3520
[ 3244.450537][T11359] ? lock_release+0x670/0x670
[ 3244.455207][T11359] ? finish_mkwrite_fault+0x3d0/0x3d0
[ 3244.460575][T11359] ? do_raw_spin_lock+0x124/0x2b0
[ 3244.465592][T11359] ? spin_bug+0x1c0/0x1c0
[ 3244.469914][T11359] ? lock_downgrade+0x690/0x690
[ 3244.474761][T11359] __handle_mm_fault+0x19a1/0x3e60
[ 3244.479875][T11359] ? vm_iomap_memory+0x190/0x190
[ 3244.484822][T11359] handle_mm_fault+0x2ba/0x9c0
[ 3244.489583][T11359] do_user_addr_fault+0x475/0x1230
[ 3244.494692][T11359] ? rcu_is_watching+0x12/0xb0
[ 3244.499453][T11359] exc_page_fault+0x98/0x170
[ 3244.504054][T11359] asm_exc_page_fault+0x26/0x30
[ 3244.508902][T11359] RIP: 0033:0x7f7b21a39610
[ 3244.513308][T11359] Code: fe ff 49 39 dc 75 eb 48 8b 44 24 18 89 28 48 83 c4 28 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 44 00 00 41 89 c5 e9 75 fe ff ff <43> 89 2c 84 e9 a3 fe ff ff 0f 1f 80 00 00 00 00 49 39 d4 74 70 48
[ 3244.532906][T11359] RSP: 002b:00007f7b21ccfac0 EFLAGS: 00010246
[ 3244.538982][T11359] RAX: 0000000091183e28 RBX: 00007f7b21bac018 RCX: 0000001b32920000
[ 3244.546943][T11359] RDX: 0000000000000000 RSI: 0000001b32920018 RDI: 000000000a26e4cb
[ 3244.554906][T11359] RBP: 0000000091183e28 R08: 0000000000001e28 R09: 0000000091183e2c
[ 3244.562867][T11359] R10: 00007f7b21ccfc80 R11: 0000000000000246 R12: 00007f7b21ba0000
[ 3244.570825][T11359] R13: 0000000000000001 R14: 000000000000000b R15: ffffffff83d3dea7
[ 3244.578789][T11359] ? apparmor_socket_create+0xb7/0x670
[ 3244.584259][T11359]
[ 3244.667573][ C0] net_ratelimit: 2374 callbacks suppressed
[ 3244.667592][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3244.685957][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3244.698204][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3244.710351][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3244.722708][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3244.735206][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3244.747415][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
05:08:25 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
process_vm_readv(0x0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, r0, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3244.759604][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3244.771741][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3244.784211][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
05:08:25 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:25 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0x0, 0x20000004, 0x0, 0x0)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3245.303697][T11359] memory: usage 307156kB, limit 307200kB, failcnt 5856
[ 3245.310660][T11359] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3245.342762][T11359] Memory cgroup stats for /syz1:
[ 3245.342912][T11359] anon 131072
[ 3245.342912][T11359] file 225280
[ 3245.342912][T11359] kernel 314171392
[ 3245.342912][T11359] kernel_stack 65536
[ 3245.342912][T11359] pagetables 73728
[ 3245.342912][T11359] sec_pagetables 0
[ 3245.342912][T11359] percpu 5433504
[ 3245.342912][T11359] sock 0
[ 3245.342912][T11359] vmalloc 8192
[ 3245.342912][T11359] shmem 225280
[ 3245.342912][T11359] zswap 0
[ 3245.342912][T11359] zswapped 0
[ 3245.342912][T11359] file_mapped 225280
[ 3245.342912][T11359] file_dirty 0
[ 3245.342912][T11359] file_writeback 0
[ 3245.342912][T11359] swapcached 0
[ 3245.342912][T11359] anon_thp 0
[ 3245.342912][T11359] file_thp 0
[ 3245.342912][T11359] shmem_thp 0
[ 3245.342912][T11359] inactive_anon 0
[ 3245.342912][T11359] active_anon 356352
[ 3245.342912][T11359] inactive_file 0
[ 3245.342912][T11359] active_file 0
[ 3245.342912][T11359] unevictable 0
[ 3245.342912][T11359] slab_reclaimable 32136
[ 3245.342912][T11359] slab_unreclaimable 308519920
[ 3245.342912][T11359] slab 308552056
[ 3245.342912][T11359] workingset_refault_anon 0
[ 3245.342912][T11359] workingset_refault_file 0
[ 3245.342912][T11359] workingset_activate_anon 0
[ 3245.342912][T11359] workingset_activate_file 0
[ 3245.342912][T11359] workingset_restore_anon 0
[ 3245.342912][T11359] workingset_restore_file 0
[ 3245.342912][T11359] workingset_nodereclaim 0
[ 3245.342912][T11359] pgscan 0
[ 3245.342912][T11359] pgsteal 0
[ 3245.342912][T11359] pgscan_kswapd 0
[ 3245.342912][T11359] pgscan_direct 0
[ 3245.342912][T11359] pgscan_khugepaged 0
[ 3245.342912][T11359] pgsteal_kswapd 0
[ 3245.342912][T11359] pgsteal_direct 0
[ 3245.342912][T11359] pgsteal_khugepaged 0
[ 3245.342912][T11359] pgfault 647005
[ 3245.342912][T11359] pgmajfault 0
[ 3245.342912][T11359] pgrefill 0
[ 3245.342912][T11359] pgactivate 0
[ 3245.342912][T11359] pgdeactivate 783
[ 3245.342912][T11359] pglazyfree 0
[ 3245.342912][T11359] pglazyfreed 0
[ 3245.342912][T11359] zswpin 0
[ 3245.342912][T11359] zswpout 0
[ 3245.342912][T11359] thp_fault_alloc 0
[ 3245.866479][T11359] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=11359,uid=0
[ 3245.945421][T11359] Memory cgroup out of memory: Killed process 11359 (syz-executor.1) total-vm:54548kB, anon-rss:512kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000
05:08:26 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0x12)
05:08:26 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, 0x0, 0x0)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:26 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(0xffffffffffffffff, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:26 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
process_vm_readv(0x0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, r0, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:26 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:26 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0x0, 0x20000004, 0x0, 0x0)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:26 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3246.554264][T11398] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000
[ 3246.625987][T11398] CPU: 1 PID: 11398 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3246.634735][T11398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3246.644806][T11398] Call Trace:
[ 3246.648087][T11398]
[ 3246.651015][T11398] dump_stack_lvl+0x136/0x150
[ 3246.655712][T11398] dump_header+0x10a/0xd70
[ 3246.660143][T11398] oom_kill_process+0x25d/0x600
[ 3246.664997][T11398] out_of_memory+0x35c/0x1660
[ 3246.669673][T11398] ? find_held_lock+0x2d/0x110
[ 3246.674438][T11398] ? oom_killer_disable+0x2b0/0x2b0
[ 3246.679633][T11398] ? rcu_read_unlock+0x9/0x60
[ 3246.684307][T11398] ? find_held_lock+0x2d/0x110
[ 3246.689087][T11398] mem_cgroup_out_of_memory+0x206/0x270
[ 3246.694648][T11398] ? mem_cgroup_margin+0x130/0x130
[ 3246.699800][T11398] ? lock_downgrade+0x690/0x690
[ 3246.704704][T11398] try_charge_memcg+0xf9b/0x13b0
[ 3246.709683][T11398] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3246.715704][T11398] ? rcu_read_unlock+0x9/0x60
[ 3246.720416][T11398] ? lock_downgrade+0x690/0x690
[ 3246.725369][T11398] charge_memcg+0x90/0x3b0
[ 3246.729819][T11398] __mem_cgroup_charge+0x2b/0x90
[ 3246.734792][T11398] do_wp_page+0x8eb/0x3520
[ 3246.739250][T11398] ? lock_release+0x670/0x670
[ 3246.743957][T11398] ? finish_mkwrite_fault+0x3d0/0x3d0
[ 3246.749367][T11398] ? do_raw_spin_lock+0x124/0x2b0
[ 3246.754417][T11398] ? spin_bug+0x1c0/0x1c0
[ 3246.758741][T11398] ? lock_downgrade+0x690/0x690
[ 3246.763595][T11398] __handle_mm_fault+0x19a1/0x3e60
[ 3246.768729][T11398] ? vm_iomap_memory+0x190/0x190
[ 3246.773676][T11398] handle_mm_fault+0x2ba/0x9c0
[ 3246.778442][T11398] do_user_addr_fault+0x475/0x1230
[ 3246.783554][T11398] ? rcu_is_watching+0x12/0xb0
[ 3246.788347][T11398] exc_page_fault+0x98/0x170
[ 3246.792941][T11398] asm_exc_page_fault+0x26/0x30
[ 3246.797800][T11398] RIP: 0033:0x7f7b21a39610
[ 3246.802238][T11398] Code: fe ff 49 39 dc 75 eb 48 8b 44 24 18 89 28 48 83 c4 28 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 44 00 00 41 89 c5 e9 75 fe ff ff <43> 89 2c 84 e9 a3 fe ff ff 0f 1f 80 00 00 00 00 49 39 d4 74 70 48
[ 3246.821855][T11398] RSP: 002b:00007f7b21ccfac0 EFLAGS: 00010246
[ 3246.827913][T11398] RAX: 0000000091183e28 RBX: 00007f7b21bac018 RCX: 0000001b32920000
[ 3246.835875][T11398] RDX: 0000000000000000 RSI: 0000001b32920018 RDI: 000000000a26e4cb
[ 3246.843839][T11398] RBP: 0000000091183e28 R08: 0000000000001e28 R09: 0000000091183e2c
[ 3246.851798][T11398] R10: 00007f7b21ccfc80 R11: 0000000000000246 R12: 00007f7b21ba0000
[ 3246.859761][T11398] R13: 0000000000000001 R14: 000000000000000b R15: ffffffff83d3dea7
[ 3246.867721][T11398] ? apparmor_socket_create+0xb7/0x670
[ 3246.873208][T11398]
05:08:27 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:27 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0x0, 0x20000004, 0x0, 0x0)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:27 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:27 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(0xffffffffffffffff, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3247.508663][T11398] memory: usage 307200kB, limit 307200kB, failcnt 5921
[ 3247.518703][T11398] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3247.544032][T11398] Memory cgroup stats for /syz1:
[ 3247.545381][T11398] anon 131072
[ 3247.545381][T11398] file 225280
[ 3247.545381][T11398] kernel 314216448
[ 3247.545381][T11398] kernel_stack 65536
[ 3247.545381][T11398] pagetables 73728
[ 3247.545381][T11398] sec_pagetables 0
[ 3247.545381][T11398] percpu 5433568
[ 3247.545381][T11398] sock 0
[ 3247.545381][T11398] vmalloc 8192
[ 3247.545381][T11398] shmem 225280
[ 3247.545381][T11398] zswap 0
[ 3247.545381][T11398] zswapped 0
[ 3247.545381][T11398] file_mapped 225280
[ 3247.545381][T11398] file_dirty 0
[ 3247.545381][T11398] file_writeback 0
[ 3247.545381][T11398] swapcached 0
[ 3247.545381][T11398] anon_thp 0
[ 3247.545381][T11398] file_thp 0
[ 3247.545381][T11398] shmem_thp 0
[ 3247.545381][T11398] inactive_anon 0
[ 3247.545381][T11398] active_anon 356352
[ 3247.545381][T11398] inactive_file 0
[ 3247.545381][T11398] active_file 0
[ 3247.545381][T11398] unevictable 0
[ 3247.545381][T11398] slab_reclaimable 45680
[ 3247.545381][T11398] slab_unreclaimable 308545752
[ 3247.545381][T11398] slab 308591432
[ 3247.545381][T11398] workingset_refault_anon 0
[ 3247.545381][T11398] workingset_refault_file 0
[ 3247.545381][T11398] workingset_activate_anon 0
[ 3247.545381][T11398] workingset_activate_file 0
[ 3247.545381][T11398] workingset_restore_anon 0
[ 3247.545381][T11398] workingset_restore_file 0
[ 3247.545381][T11398] workingset_nodereclaim 0
[ 3247.545381][T11398] pgscan 0
[ 3247.545381][T11398] pgsteal 0
[ 3247.545381][T11398] pgscan_kswapd 0
[ 3247.545381][T11398] pgscan_direct 0
[ 3247.545381][T11398] pgscan_khugepaged 0
[ 3247.545381][T11398] pgsteal_kswapd 0
[ 3247.545381][T11398] pgsteal_direct 0
[ 3247.545381][T11398] pgsteal_khugepaged 0
[ 3247.545381][T11398] pgfault 647058
[ 3247.545381][T11398] pgmajfault 0
[ 3247.545381][T11398] pgrefill 0
[ 3247.545381][T11398] pgactivate 0
[ 3247.545381][T11398] pgdeactivate 783
[ 3247.545381][T11398] pglazyfree 0
[ 3247.545381][T11398] pglazyfreed 0
[ 3247.545381][T11398] zswpin 0
[ 3247.545381][T11398] zswpout 0
[ 3247.545381][T11398] thp_fault_alloc 0
05:08:28 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3248.370813][T11398] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=11398,uid=0
[ 3248.496793][T11398] Memory cgroup out of memory: Killed process 11398 (syz-executor.1) total-vm:54548kB, anon-rss:512kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000
05:08:29 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0x13)
05:08:29 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:29 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:29 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0x0, 0x20000004, 0x0, 0x0)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:29 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:29 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, 0xffffffffffffffff, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3248.974780][T11435] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000
[ 3249.064468][T11435] CPU: 1 PID: 11435 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3249.073182][T11435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3249.083227][T11435] Call Trace:
[ 3249.086495][T11435]
[ 3249.089416][T11435] dump_stack_lvl+0x136/0x150
[ 3249.094110][T11435] dump_header+0x10a/0xd70
[ 3249.098522][T11435] oom_kill_process+0x25d/0x600
[ 3249.103390][T11435] out_of_memory+0x35c/0x1660
[ 3249.108062][T11435] ? find_held_lock+0x2d/0x110
[ 3249.113175][T11435] ? oom_killer_disable+0x2b0/0x2b0
[ 3249.118368][T11435] ? rcu_read_unlock+0x9/0x60
[ 3249.123045][T11435] ? find_held_lock+0x2d/0x110
[ 3249.127816][T11435] mem_cgroup_out_of_memory+0x206/0x270
[ 3249.133363][T11435] ? mem_cgroup_margin+0x130/0x130
[ 3249.138474][T11435] ? lock_downgrade+0x690/0x690
[ 3249.143326][T11435] try_charge_memcg+0xf9b/0x13b0
[ 3249.148273][T11435] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3249.154262][T11435] ? rcu_read_unlock+0x9/0x60
[ 3249.158953][T11435] ? lock_downgrade+0x690/0x690
[ 3249.163804][T11435] charge_memcg+0x90/0x3b0
[ 3249.168216][T11435] __mem_cgroup_charge+0x2b/0x90
[ 3249.173147][T11435] do_wp_page+0x8eb/0x3520
[ 3249.177561][T11435] ? lock_release+0x670/0x670
[ 3249.182230][T11435] ? finish_mkwrite_fault+0x3d0/0x3d0
[ 3249.187594][T11435] ? do_raw_spin_lock+0x124/0x2b0
[ 3249.192629][T11435] ? spin_bug+0x1c0/0x1c0
[ 3249.196966][T11435] ? lock_downgrade+0x690/0x690
[ 3249.201823][T11435] __handle_mm_fault+0x19a1/0x3e60
[ 3249.206949][T11435] ? vm_iomap_memory+0x190/0x190
[ 3249.212358][T11435] handle_mm_fault+0x2ba/0x9c0
[ 3249.217126][T11435] do_user_addr_fault+0x475/0x1230
[ 3249.222239][T11435] ? rcu_is_watching+0x12/0xb0
[ 3249.227018][T11435] exc_page_fault+0x98/0x170
[ 3249.231620][T11435] asm_exc_page_fault+0x26/0x30
[ 3249.236467][T11435] RIP: 0033:0x7f7b21a39610
[ 3249.240889][T11435] Code: fe ff 49 39 dc 75 eb 48 8b 44 24 18 89 28 48 83 c4 28 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 44 00 00 41 89 c5 e9 75 fe ff ff <43> 89 2c 84 e9 a3 fe ff ff 0f 1f 80 00 00 00 00 49 39 d4 74 70 48
[ 3249.260508][T11435] RSP: 002b:00007f7b21ccfac0 EFLAGS: 00010246
[ 3249.266566][T11435] RAX: 00000000d489b7a9 RBX: 00007f7b21bac018 RCX: 0000001b32920000
[ 3249.274525][T11435] RDX: 0000000000000000 RSI: 0000001b32920018 RDI: 000000000a26e479
[ 3249.282486][T11435] RBP: 00000000d489b7a9 R08: 00000000000017a9 R09: 00000000d489b7ad
[ 3249.290447][T11435] R10: 00007f7b21ccfc80 R11: 0000000000000246 R12: 00007f7b21ba0000
[ 3249.298427][T11435] R13: 0000000000000001 R14: 000000000000000c R15: ffffffff83d3ded4
[ 3249.306387][T11435] ? apparmor_socket_create+0xe4/0x670
[ 3249.311854][T11435]
[ 3249.572768][T11435] memory: usage 307200kB, limit 307200kB, failcnt 5998
[ 3249.603899][T11435] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3249.631776][T11435] Memory cgroup stats for /syz1:
[ 3249.641216][T11435] anon 135168
[ 3249.641216][T11435] file 225280
[ 3249.641216][T11435] kernel 314212352
[ 3249.641216][T11435] kernel_stack 65536
[ 3249.641216][T11435] pagetables 73728
[ 3249.641216][T11435] sec_pagetables 0
[ 3249.641216][T11435] percpu 5433568
[ 3249.641216][T11435] sock 0
[ 3249.641216][T11435] vmalloc 8192
[ 3249.641216][T11435] shmem 225280
[ 3249.641216][T11435] zswap 0
[ 3249.641216][T11435] zswapped 0
[ 3249.641216][T11435] file_mapped 225280
[ 3249.641216][T11435] file_dirty 0
[ 3249.641216][T11435] file_writeback 0
[ 3249.641216][T11435] swapcached 0
[ 3249.641216][T11435] anon_thp 0
[ 3249.641216][T11435] file_thp 0
[ 3249.641216][T11435] shmem_thp 0
[ 3249.641216][T11435] inactive_anon 0
[ 3249.641216][T11435] active_anon 360448
[ 3249.641216][T11435] inactive_file 0
[ 3249.641216][T11435] active_file 0
[ 3249.641216][T11435] unevictable 0
[ 3249.641216][T11435] slab_reclaimable 45296
[ 3249.641216][T11435] slab_unreclaimable 308544472
[ 3249.641216][T11435] slab 308589768
[ 3249.641216][T11435] workingset_refault_anon 0
[ 3249.641216][T11435] workingset_refault_file 0
[ 3249.641216][T11435] workingset_activate_anon 0
[ 3249.641216][T11435] workingset_activate_file 0
[ 3249.641216][T11435] workingset_restore_anon 0
[ 3249.641216][T11435] workingset_restore_file 0
[ 3249.641216][T11435] workingset_nodereclaim 0
[ 3249.641216][T11435] pgscan 0
[ 3249.641216][T11435] pgsteal 0
[ 3249.641216][T11435] pgscan_kswapd 0
[ 3249.641216][T11435] pgscan_direct 0
[ 3249.641216][T11435] pgscan_khugepaged 0
[ 3249.641216][T11435] pgsteal_kswapd 0
[ 3249.641216][T11435] pgsteal_direct 0
[ 3249.641216][T11435] pgsteal_khugepaged 0
[ 3249.641216][T11435] pgfault 647110
[ 3249.641216][T11435] pgmajfault 0
[ 3249.641216][T11435] pgrefill 0
[ 3249.641216][T11435] pgactivate 0
[ 3249.641216][T11435] pgdeactivate 783
[ 3249.641216][T11435] pglazyfree 0
[ 3249.641216][T11435] pglazyfreed 0
[ 3249.641216][T11435] zswpin 0
[ 3249.641216][T11435] zswpout 0
[ 3249.641216][T11435] thp_fault_alloc 0
[ 3249.856829][ C0] net_ratelimit: 2344 callbacks suppressed
[ 3249.856842][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3249.875230][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3249.887572][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3249.899844][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3249.912008][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3249.924502][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3249.936695][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3249.948845][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3249.960915][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3249.973344][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
05:08:30 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:30 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(0xffffffffffffffff, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:30 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, 0xffffffffffffffff, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:30 executing program 2:
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:30 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3251.133151][T11435] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=11435,uid=0
05:08:31 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3251.217098][T11435] Memory cgroup out of memory: Killed process 11435 (syz-executor.1) total-vm:54548kB, anon-rss:384kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000
05:08:32 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0x24)
05:08:32 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, 0xffffffffffffffff, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:32 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(0xffffffffffffffff, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:32 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:32 executing program 2:
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:32 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:33 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3253.148077][T11486] syz-executor.1 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000
05:08:33 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(0xffffffffffffffff, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3253.306463][T11486] CPU: 1 PID: 11486 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3253.315541][T11486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3253.325620][T11486] Call Trace:
[ 3253.328905][T11486]
[ 3253.331837][T11486] dump_stack_lvl+0x136/0x150
[ 3253.336513][T11486] dump_header+0x10a/0xd70
[ 3253.340928][T11486] oom_kill_process+0x25d/0x600
[ 3253.345782][T11486] out_of_memory+0x35c/0x1660
[ 3253.350460][T11486] ? find_held_lock+0x2d/0x110
[ 3253.355227][T11486] ? oom_killer_disable+0x2b0/0x2b0
[ 3253.360441][T11486] ? rcu_read_unlock+0x9/0x60
[ 3253.365122][T11486] ? find_held_lock+0x2d/0x110
[ 3253.369887][T11486] mem_cgroup_out_of_memory+0x206/0x270
[ 3253.375433][T11486] ? mem_cgroup_margin+0x130/0x130
[ 3253.380542][T11486] ? lock_downgrade+0x690/0x690
[ 3253.385393][T11486] try_charge_memcg+0xf9b/0x13b0
[ 3253.390337][T11486] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3253.396325][T11486] ? get_mem_cgroup_from_objcg+0xa1/0x280
[ 3253.402043][T11486] ? lock_downgrade+0x690/0x690
[ 3253.406893][T11486] ? lock_downgrade+0x690/0x690
[ 3253.411744][T11486] __memcg_kmem_charge_page+0x16e/0x3c0
[ 3253.417282][T11486] __alloc_pages+0x1f3/0x4a0
[ 3253.421867][T11486] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170
[ 3253.428624][T11486] ? __lock_acquire+0xbc5/0x5d40
[ 3253.433561][T11486] alloc_pages+0x1aa/0x270
[ 3253.437980][T11486] __pmd_alloc+0x3f/0x5d0
[ 3253.442309][T11486] __handle_mm_fault+0x932/0x3e60
[ 3253.447331][T11486] ? vm_iomap_memory+0x190/0x190
[ 3253.452280][T11486] handle_mm_fault+0x2ba/0x9c0
[ 3253.457043][T11486] do_user_addr_fault+0x475/0x1230
[ 3253.462168][T11486] ? rcu_is_watching+0x12/0xb0
[ 3253.466937][T11486] exc_page_fault+0x98/0x170
[ 3253.471523][T11486] asm_exc_page_fault+0x26/0x30
[ 3253.476373][T11486] RIP: 0033:0x7f7b21a2bde9
[ 3253.480795][T11486] Code: 48 8b 04 24 48 85 c0 74 17 48 8b 54 24 18 48 0f ca 48 89 54 24 18 48 83 f8 01 0f 85 9b 02 00 00 48 8b 44 24 10 48 8b 54 24 18 <48> 89 10 e9 c2 fd ff ff 48 8b 44 24 10 0f b7 10 48 8b 04 24 48 85
[ 3253.500426][T11486] RSP: 002b:00007f7b21ccfb60 EFLAGS: 00010246
[ 3253.506501][T11486] RAX: 0000000020000280 RBX: 0000000000000000 RCX: 0000000000000000
[ 3253.514465][T11486] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00005555561b82e8
[ 3253.522424][T11486] RBP: 00007f7b21ccfc58 R08: 0000000000000000 R09: 0000000000000000
[ 3253.530387][T11486] R10: 00007f7b21600068 R11: 0000000000000246 R12: 0000000000319c33
[ 3253.538350][T11486] R13: 00007f7b21ccfc80 R14: 00007f7b21babf80 R15: 0000000000000032
[ 3253.546327][T11486]
[ 3253.742927][T11486] memory: usage 307200kB, limit 307200kB, failcnt 6074
[ 3253.784371][T11486] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3253.857071][T11486] Memory cgroup stats for /syz1:
[ 3253.857236][T11486] anon 143360
[ 3253.857236][T11486] file 225280
[ 3253.857236][T11486] kernel 314204160
[ 3253.857236][T11486] kernel_stack 65536
[ 3253.857236][T11486] pagetables 73728
[ 3253.857236][T11486] sec_pagetables 0
[ 3253.857236][T11486] percpu 5433568
[ 3253.857236][T11486] sock 0
[ 3253.857236][T11486] vmalloc 8192
[ 3253.857236][T11486] shmem 225280
[ 3253.857236][T11486] zswap 0
[ 3253.857236][T11486] zswapped 0
[ 3253.857236][T11486] file_mapped 225280
[ 3253.857236][T11486] file_dirty 0
[ 3253.857236][T11486] file_writeback 0
[ 3253.857236][T11486] swapcached 0
[ 3253.857236][T11486] anon_thp 0
[ 3253.857236][T11486] file_thp 0
[ 3253.857236][T11486] shmem_thp 0
[ 3253.857236][T11486] inactive_anon 0
[ 3253.857236][T11486] active_anon 368640
[ 3253.857236][T11486] inactive_file 0
[ 3253.857236][T11486] active_file 0
[ 3253.857236][T11486] unevictable 0
[ 3253.857236][T11486] slab_reclaimable 44136
[ 3253.857236][T11486] slab_unreclaimable 308536952
[ 3253.857236][T11486] slab 308581088
[ 3253.857236][T11486] workingset_refault_anon 0
[ 3253.857236][T11486] workingset_refault_file 0
[ 3253.857236][T11486] workingset_activate_anon 0
[ 3253.857236][T11486] workingset_activate_file 0
[ 3253.857236][T11486] workingset_restore_anon 0
[ 3253.857236][T11486] workingset_restore_file 0
[ 3253.857236][T11486] workingset_nodereclaim 0
[ 3253.857236][T11486] pgscan 0
[ 3253.857236][T11486] pgsteal 0
[ 3253.857236][T11486] pgscan_kswapd 0
[ 3253.857236][T11486] pgscan_direct 0
[ 3253.857236][T11486] pgscan_khugepaged 0
[ 3253.857236][T11486] pgsteal_kswapd 0
[ 3253.857236][T11486] pgsteal_direct 0
05:08:34 executing program 2:
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:34 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x0)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3253.857236][T11486] pgsteal_khugepaged 0
[ 3253.857236][T11486] pgfault 647168
[ 3253.857236][T11486] pgmajfault 0
[ 3253.857236][T11486] pgrefill 0
[ 3253.857236][T11486] pgactivate 0
[ 3253.857236][T11486] pgdeactivate 783
[ 3253.857236][T11486] pglazyfree 0
[ 3253.857236][T11486] pglazyfreed 0
[ 3253.857236][T11486] zswpin 0
[ 3253.857236][T11486] zswpout 0
[ 3253.857236][T11486] thp_fault_alloc 0
05:08:34 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:34 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3254.858657][ C1] net_ratelimit: 2253 callbacks suppressed
[ 3254.858679][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3254.876843][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3254.889834][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3254.902183][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3254.915136][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3254.927470][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3254.940418][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3254.952722][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3254.965687][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3254.977985][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3255.648593][T11486] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=11486,uid=0
[ 3255.999123][T11486] Memory cgroup out of memory: Killed process 11486 (syz-executor.1) total-vm:54548kB, anon-rss:384kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000
[ 3256.375744][T11524] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000
[ 3256.440362][T11524] CPU: 1 PID: 11524 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3256.449105][T11524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3256.459189][T11524] Call Trace:
[ 3256.462484][T11524]
[ 3256.465430][T11524] dump_stack_lvl+0x136/0x150
[ 3256.470140][T11524] dump_header+0x10a/0xd70
[ 3256.474602][T11524] oom_kill_process+0x25d/0x600
[ 3256.479490][T11524] out_of_memory+0x35c/0x1660
[ 3256.484205][T11524] ? find_held_lock+0x2d/0x110
[ 3256.489012][T11524] ? oom_killer_disable+0x2b0/0x2b0
[ 3256.494254][T11524] ? rcu_read_unlock+0x9/0x60
[ 3256.498970][T11524] ? find_held_lock+0x2d/0x110
[ 3256.503782][T11524] mem_cgroup_out_of_memory+0x206/0x270
[ 3256.509368][T11524] ? mem_cgroup_margin+0x130/0x130
[ 3256.514524][T11524] ? lock_downgrade+0x690/0x690
[ 3256.519418][T11524] try_charge_memcg+0xf9b/0x13b0
[ 3256.524389][T11524] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3256.530403][T11524] ? rcu_read_unlock+0x9/0x60
[ 3256.535115][T11524] ? lock_downgrade+0x690/0x690
[ 3256.540013][T11524] charge_memcg+0x90/0x3b0
[ 3256.544459][T11524] __mem_cgroup_charge+0x2b/0x90
[ 3256.549427][T11524] do_wp_page+0x8eb/0x3520
[ 3256.553886][T11524] ? lock_release+0x670/0x670
[ 3256.558586][T11524] ? finish_mkwrite_fault+0x3d0/0x3d0
[ 3256.563986][T11524] ? do_raw_spin_lock+0x124/0x2b0
[ 3256.569041][T11524] ? spin_bug+0x1c0/0x1c0
[ 3256.573395][T11524] ? lock_downgrade+0x690/0x690
[ 3256.578286][T11524] __handle_mm_fault+0x19a1/0x3e60
[ 3256.583436][T11524] ? vm_iomap_memory+0x190/0x190
[ 3256.588429][T11524] handle_mm_fault+0x2ba/0x9c0
[ 3256.593230][T11524] do_user_addr_fault+0x475/0x1230
[ 3256.598397][T11524] ? rcu_is_watching+0x12/0xb0
[ 3256.603199][T11524] exc_page_fault+0x98/0x170
[ 3256.607820][T11524] asm_exc_page_fault+0x26/0x30
[ 3256.612704][T11524] RIP: 0033:0x7f7b21a39610
[ 3256.617138][T11524] Code: fe ff 49 39 dc 75 eb 48 8b 44 24 18 89 28 48 83 c4 28 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 44 00 00 41 89 c5 e9 75 fe ff ff <43> 89 2c 84 e9 a3 fe ff ff 0f 1f 80 00 00 00 00 49 39 d4 74 70 48
[ 3256.636779][T11524] RSP: 002b:00007f7b21ccfac0 EFLAGS: 00010246
[ 3256.642879][T11524] RAX: 00000000152aab2b RBX: 00007f7b21bac018 RCX: 0000001b32920000
[ 3256.650845][T11524] RDX: 0000000000000000 RSI: 0000001b32920018 RDI: 000000000913af7c
[ 3256.658837][T11524] RBP: 00000000152aab2b R08: 0000000000000b2b R09: 00000000152aab2f
[ 3256.666816][T11524] R10: 00007f7b21ccfc80 R11: 0000000000000246 R12: 00007f7b21ba0000
[ 3256.674777][T11524] R13: 0000000000000001 R14: 000000000000001b R15: ffffffff81ea510c
[ 3256.682741][T11524] ? alloc_inode+0xc/0x230
[ 3256.687169][T11524]
05:08:36 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0x3c)
05:08:36 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, 0xffffffffffffffff, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:36 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x0)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:36 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:36 executing program 2:
open(0x0, 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:36 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3256.901542][T11524] memory: usage 307200kB, limit 307200kB, failcnt 6136
[ 3256.908474][T11524] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3256.942343][T11524] Memory cgroup stats for /syz1:
[ 3256.944927][T11524] anon 139264
[ 3256.944927][T11524] file 225280
[ 3256.944927][T11524] kernel 314183680
[ 3256.944927][T11524] kernel_stack 65536
[ 3256.944927][T11524] pagetables 73728
[ 3256.944927][T11524] sec_pagetables 0
[ 3256.944927][T11524] percpu 5433504
[ 3256.944927][T11524] sock 0
[ 3256.944927][T11524] vmalloc 8192
[ 3256.944927][T11524] shmem 225280
[ 3256.944927][T11524] zswap 0
[ 3256.944927][T11524] zswapped 0
[ 3256.944927][T11524] file_mapped 225280
[ 3256.944927][T11524] file_dirty 0
[ 3256.944927][T11524] file_writeback 0
[ 3256.944927][T11524] swapcached 0
[ 3256.944927][T11524] anon_thp 0
[ 3256.944927][T11524] file_thp 0
[ 3256.944927][T11524] shmem_thp 0
[ 3256.944927][T11524] inactive_anon 0
[ 3256.944927][T11524] active_anon 364544
[ 3256.944927][T11524] inactive_file 0
[ 3256.944927][T11524] active_file 0
[ 3256.944927][T11524] unevictable 0
[ 3256.944927][T11524] slab_reclaimable 40624
[ 3256.944927][T11524] slab_unreclaimable 308523856
[ 3256.944927][T11524] slab 308564480
[ 3256.944927][T11524] workingset_refault_anon 0
[ 3256.944927][T11524] workingset_refault_file 0
[ 3256.944927][T11524] workingset_activate_anon 0
[ 3256.944927][T11524] workingset_activate_file 0
[ 3256.944927][T11524] workingset_restore_anon 0
[ 3256.944927][T11524] workingset_restore_file 0
[ 3256.944927][T11524] workingset_nodereclaim 0
[ 3256.944927][T11524] pgscan 0
[ 3256.944927][T11524] pgsteal 0
[ 3256.944927][T11524] pgscan_kswapd 0
[ 3256.944927][T11524] pgscan_direct 0
[ 3256.944927][T11524] pgscan_khugepaged 0
[ 3256.944927][T11524] pgsteal_kswapd 0
[ 3256.944927][T11524] pgsteal_direct 0
[ 3256.944927][T11524] pgsteal_khugepaged 0
[ 3256.944927][T11524] pgfault 647225
[ 3256.944927][T11524] pgmajfault 0
[ 3256.944927][T11524] pgrefill 0
[ 3256.944927][T11524] pgactivate 0
[ 3256.944927][T11524] pgdeactivate 783
[ 3256.944927][T11524] pglazyfree 0
[ 3256.944927][T11524] pglazyfreed 0
[ 3256.944927][T11524] zswpin 0
[ 3256.944927][T11524] zswpout 0
[ 3256.944927][T11524] thp_fault_alloc 0
05:08:37 executing program 2:
open(0x0, 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:37 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:37 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:37 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, 0xffffffffffffffff, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:37 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x0)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:39 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, 0xffffffffffffffff, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3259.598674][T11524] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=11524,uid=0
[ 3259.721095][T11524] Memory cgroup out of memory: Killed process 11524 (syz-executor.1) total-vm:54548kB, anon-rss:384kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000
[ 3259.869270][ C1] net_ratelimit: 2467 callbacks suppressed
[ 3259.869290][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3259.887499][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3259.888051][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3259.900299][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3259.912296][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3259.923603][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3259.935553][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
05:08:40 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0x48)
05:08:40 executing program 2:
open(0x0, 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:40 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, 0x0, 0xc9)
05:08:40 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:40 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3259.948189][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3259.959624][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3259.971600][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3260.231796][T11567] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000
[ 3260.242079][T11567] CPU: 1 PID: 11567 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3260.250765][T11567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3260.260817][T11567] Call Trace:
[ 3260.264090][T11567]
[ 3260.267017][T11567] dump_stack_lvl+0x136/0x150
[ 3260.271696][T11567] dump_header+0x10a/0xd70
[ 3260.276117][T11567] oom_kill_process+0x25d/0x600
[ 3260.280967][T11567] out_of_memory+0x35c/0x1660
[ 3260.285665][T11567] ? find_held_lock+0x2d/0x110
[ 3260.290449][T11567] ? oom_killer_disable+0x2b0/0x2b0
[ 3260.295684][T11567] ? rcu_read_unlock+0x9/0x60
[ 3260.300407][T11567] ? find_held_lock+0x2d/0x110
[ 3260.305219][T11567] mem_cgroup_out_of_memory+0x206/0x270
[ 3260.310836][T11567] ? mem_cgroup_margin+0x130/0x130
[ 3260.315985][T11567] ? lock_downgrade+0x690/0x690
[ 3260.320882][T11567] try_charge_memcg+0xf9b/0x13b0
[ 3260.325853][T11567] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3260.331867][T11567] ? rcu_read_unlock+0x9/0x60
[ 3260.336572][T11567] ? lock_downgrade+0x690/0x690
[ 3260.341469][T11567] charge_memcg+0x90/0x3b0
[ 3260.345917][T11567] __mem_cgroup_charge+0x2b/0x90
[ 3260.350883][T11567] do_wp_page+0x8eb/0x3520
[ 3260.355336][T11567] ? lock_release+0x670/0x670
[ 3260.360040][T11567] ? finish_mkwrite_fault+0x3d0/0x3d0
[ 3260.365445][T11567] ? do_raw_spin_lock+0x124/0x2b0
[ 3260.370498][T11567] ? spin_bug+0x1c0/0x1c0
[ 3260.374852][T11567] ? lock_downgrade+0x690/0x690
[ 3260.379745][T11567] __handle_mm_fault+0x19a1/0x3e60
[ 3260.384892][T11567] ? vm_iomap_memory+0x190/0x190
[ 3260.389883][T11567] handle_mm_fault+0x2ba/0x9c0
[ 3260.394686][T11567] do_user_addr_fault+0x475/0x1230
[ 3260.399841][T11567] ? rcu_is_watching+0x12/0xb0
[ 3260.404640][T11567] exc_page_fault+0x98/0x170
[ 3260.409259][T11567] asm_exc_page_fault+0x26/0x30
[ 3260.414141][T11567] RIP: 0033:0x7f7b21a39610
[ 3260.418572][T11567] Code: fe ff 49 39 dc 75 eb 48 8b 44 24 18 89 28 48 83 c4 28 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 44 00 00 41 89 c5 e9 75 fe ff ff <43> 89 2c 84 e9 a3 fe ff ff 0f 1f 80 00 00 00 00 49 39 d4 74 70 48
[ 3260.438192][T11567] RSP: 002b:00007f7b21ccfac0 EFLAGS: 00010246
[ 3260.444259][T11567] RAX: 00000000d489b7a9 RBX: 00007f7b21bac018 RCX: 0000001b32920000
[ 3260.452227][T11567] RDX: 0000000000000000 RSI: 0000001b32920018 RDI: 000000000a26e479
[ 3260.460189][T11567] RBP: 00000000d489b7a9 R08: 00000000000017a9 R09: 00000000d489b7ad
[ 3260.468154][T11567] R10: 00007f7b21ccfc80 R11: 0000000000000246 R12: 00007f7b21ba0000
[ 3260.476117][T11567] R13: 0000000000000001 R14: 000000000000000c R15: ffffffff83d3ded4
[ 3260.484081][T11567] ? apparmor_socket_create+0xe4/0x670
[ 3260.489551][T11567]
05:08:40 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
getpid()
r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, r0, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:41 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
getpid()
r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, r0, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:41 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:41 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
getpid()
r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, r0, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:41 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, 0x0, 0xc9)
05:08:41 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3261.333998][T11567] memory: usage 307192kB, limit 307200kB, failcnt 6215
05:08:41 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
process_vm_readv(0x0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, r0, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3261.442161][T11567] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3261.618949][T11567] Memory cgroup stats for /syz1:
[ 3261.619205][T11567] anon 135168
[ 3261.619205][T11567] file 225280
[ 3261.619205][T11567] kernel 314183680
[ 3261.619205][T11567] kernel_stack 65536
[ 3261.619205][T11567] pagetables 73728
[ 3261.619205][T11567] sec_pagetables 0
[ 3261.619205][T11567] percpu 5433504
[ 3261.619205][T11567] sock 0
[ 3261.619205][T11567] vmalloc 8192
[ 3261.619205][T11567] shmem 225280
[ 3261.619205][T11567] zswap 0
[ 3261.619205][T11567] zswapped 0
[ 3261.619205][T11567] file_mapped 225280
[ 3261.619205][T11567] file_dirty 0
[ 3261.619205][T11567] file_writeback 0
[ 3261.619205][T11567] swapcached 0
[ 3261.619205][T11567] anon_thp 0
[ 3261.619205][T11567] file_thp 0
[ 3261.619205][T11567] shmem_thp 0
[ 3261.619205][T11567] inactive_anon 0
[ 3261.619205][T11567] active_anon 360448
[ 3261.619205][T11567] inactive_file 0
[ 3261.619205][T11567] active_file 0
[ 3261.619205][T11567] unevictable 0
[ 3261.619205][T11567] slab_reclaimable 39848
[ 3261.619205][T11567] slab_unreclaimable 308523112
[ 3261.619205][T11567] slab 308562960
[ 3261.619205][T11567] workingset_refault_anon 0
[ 3261.619205][T11567] workingset_refault_file 0
[ 3261.619205][T11567] workingset_activate_anon 0
[ 3261.619205][T11567] workingset_activate_file 0
[ 3261.619205][T11567] workingset_restore_anon 0
[ 3261.619205][T11567] workingset_restore_file 0
[ 3261.619205][T11567] workingset_nodereclaim 0
[ 3261.619205][T11567] pgscan 0
[ 3261.619205][T11567] pgsteal 0
[ 3261.619205][T11567] pgscan_kswapd 0
[ 3261.619205][T11567] pgscan_direct 0
[ 3261.619205][T11567] pgscan_khugepaged 0
[ 3261.619205][T11567] pgsteal_kswapd 0
[ 3261.619205][T11567] pgsteal_direct 0
[ 3261.619205][T11567] pgsteal_khugepaged 0
[ 3261.619205][T11567] pgfault 647280
[ 3261.619205][T11567] pgmajfault 0
[ 3261.619205][T11567] pgrefill 0
[ 3261.619205][T11567] pgactivate 0
[ 3261.619205][T11567] pgdeactivate 783
[ 3261.619205][T11567] pglazyfree 0
[ 3261.619205][T11567] pglazyfreed 0
[ 3261.619205][T11567] zswpin 0
[ 3261.619205][T11567] zswpout 0
[ 3261.619205][T11567] thp_fault_alloc 0
[ 3263.267715][T11567] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=11567,uid=0
[ 3263.328637][T11567] Memory cgroup out of memory: Killed process 11567 (syz-executor.1) total-vm:54548kB, anon-rss:512kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000
05:08:43 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0x4a)
05:08:43 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
process_vm_readv(0x0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, r0, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:43 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:43 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, 0x0, 0xc9)
05:08:43 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:43 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:44 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
process_vm_readv(0x0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, r0, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3263.992044][T11616] syz-executor.1 invoked oom-killer: gfp_mask=0x400cc0(GFP_KERNEL_ACCOUNT), order=1, oom_score_adj=1000
[ 3264.132856][T11616] CPU: 0 PID: 11616 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3264.141631][T11616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3264.151682][T11616] Call Trace:
[ 3264.154954][T11616]
[ 3264.157881][T11616] dump_stack_lvl+0x136/0x150
[ 3264.162574][T11616] dump_header+0x10a/0xd70
[ 3264.166993][T11616] oom_kill_process+0x25d/0x600
[ 3264.171859][T11616] out_of_memory+0x35c/0x1660
[ 3264.176542][T11616] ? find_held_lock+0x2d/0x110
[ 3264.181311][T11616] ? oom_killer_disable+0x2b0/0x2b0
[ 3264.186509][T11616] ? rcu_read_unlock+0x9/0x60
[ 3264.191185][T11616] ? find_held_lock+0x2d/0x110
[ 3264.195966][T11616] mem_cgroup_out_of_memory+0x206/0x270
[ 3264.201547][T11616] ? mem_cgroup_margin+0x130/0x130
[ 3264.206653][T11616] ? lock_downgrade+0x690/0x690
[ 3264.211512][T11616] try_charge_memcg+0xf9b/0x13b0
[ 3264.216447][T11616] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3264.222419][T11616] ? get_mem_cgroup_from_objcg+0xa1/0x280
[ 3264.228134][T11616] ? lock_downgrade+0x690/0x690
[ 3264.232980][T11616] ? lock_downgrade+0x690/0x690
[ 3264.237829][T11616] obj_cgroup_charge+0x2af/0x5e0
[ 3264.242761][T11616] __kmem_cache_alloc_node+0xa3/0x320
[ 3264.248130][T11616] ? neigh_sysctl_register+0x9e/0x5f0
[ 3264.253505][T11616] ? neigh_sysctl_register+0x9e/0x5f0
[ 3264.258891][T11616] __kmalloc_node_track_caller+0x4f/0x1a0
[ 3264.264609][T11616] kmemdup+0x2c/0x60
[ 3264.268497][T11616] neigh_sysctl_register+0x9e/0x5f0
[ 3264.273703][T11616] ? pndisc_destructor+0x240/0x240
[ 3264.278810][T11616] ? neigh_stat_seq_show+0x420/0x420
[ 3264.284095][T11616] ? debug_object_free+0x360/0x360
[ 3264.289200][T11616] ? lockdep_init_map_type+0x21e/0x810
[ 3264.294653][T11616] ? lockdep_init_map_type+0x21e/0x810
[ 3264.300103][T11616] ? __raw_spin_lock_init+0x3a/0x110
[ 3264.305388][T11616] addrconf_sysctl_register+0xb6/0x1d0
[ 3264.310840][T11616] ? ipv6_mc_init_dev+0x954/0xb50
[ 3264.315866][T11616] ipv6_add_dev+0xa0d/0x13b0
[ 3264.320472][T11616] addrconf_notify+0x63d/0x19f0
[ 3264.325317][T11616] ? tee_netdev_event+0x2d7/0x390
[ 3264.330339][T11616] ? ip6mr_device_event+0x1af/0x220
[ 3264.335535][T11616] ? mutex_is_locked+0x12/0x50
[ 3264.340302][T11616] notifier_call_chain+0xb5/0x200
[ 3264.345334][T11616] call_netdevice_notifiers_info+0xb5/0x130
[ 3264.351229][T11616] register_netdevice+0xfb4/0x1640
[ 3264.356341][T11616] ? unregister_netdevice_queue+0x3c0/0x3c0
[ 3264.362240][T11616] br_dev_newlink+0x27/0x110
[ 3264.366870][T11616] ? br_changelink+0x1660/0x1660
[ 3264.371805][T11616] __rtnl_newlink+0x10c2/0x1840
[ 3264.376662][T11616] ? rtnl_link_unregister+0x250/0x250
[ 3264.382037][T11616] ? __kmem_cache_alloc_node+0x48/0x320
[ 3264.387590][T11616] ? rtnl_newlink+0x4a/0xa0
[ 3264.392098][T11616] rtnl_newlink+0x68/0xa0
[ 3264.396435][T11616] ? __rtnl_newlink+0x1840/0x1840
[ 3264.401464][T11616] rtnetlink_rcv_msg+0x43d/0xd50
[ 3264.406399][T11616] ? rtnl_stats_set+0x4d0/0x4d0
[ 3264.411244][T11616] ? find_held_lock+0x2d/0x110
[ 3264.416008][T11616] ? rcu_preempt_deferred_qs_irqrestore+0x57b/0xd60
[ 3264.422594][T11616] ? lock_downgrade+0x690/0x690
[ 3264.427439][T11616] netlink_rcv_skb+0x165/0x440
[ 3264.432204][T11616] ? rtnl_stats_set+0x4d0/0x4d0
[ 3264.437049][T11616] ? netlink_ack+0x1360/0x1360
[ 3264.441807][T11616] ? _raw_spin_unlock_irqrestore+0x41/0x70
[ 3264.447621][T11616] ? __rcu_read_unlock+0x2a0/0x570
[ 3264.452731][T11616] ? netlink_deliver_tap+0x1b1/0xcf0
[ 3264.458013][T11616] netlink_unicast+0x547/0x7f0
[ 3264.462774][T11616] ? netlink_attachskb+0x890/0x890
[ 3264.467878][T11616] ? __virt_addr_valid+0x61/0x2e0
[ 3264.472906][T11616] ? __phys_addr_symbol+0x30/0x70
[ 3264.477926][T11616] ? __check_object_size+0x333/0x6e0
[ 3264.483212][T11616] netlink_sendmsg+0x925/0xe30
[ 3264.487975][T11616] ? netlink_unicast+0x7f0/0x7f0
[ 3264.492910][T11616] ? bpf_lsm_socket_sendmsg+0x9/0x10
[ 3264.498188][T11616] ? netlink_unicast+0x7f0/0x7f0
[ 3264.503119][T11616] sock_sendmsg+0xde/0x190
[ 3264.507536][T11616] ____sys_sendmsg+0x71c/0x900
[ 3264.512295][T11616] ? copy_msghdr_from_user+0xfc/0x150
[ 3264.517663][T11616] ? kernel_sendmsg+0x50/0x50
[ 3264.522336][T11616] ? futex_unqueue+0xb7/0x120
[ 3264.527009][T11616] ? futex_wait+0x503/0x680
[ 3264.531512][T11616] ___sys_sendmsg+0x110/0x1b0
[ 3264.536186][T11616] ? do_recvmmsg+0x6e0/0x6e0
[ 3264.540774][T11616] ? __fget_files+0x248/0x480
[ 3264.545466][T11616] ? lock_downgrade+0x690/0x690
[ 3264.550318][T11616] ? __fget_files+0x26a/0x480
[ 3264.554999][T11616] ? __fget_light+0xe5/0x270
[ 3264.559592][T11616] __sys_sendmsg+0xf7/0x1c0
[ 3264.564093][T11616] ? __sys_sendmsg_sock+0x40/0x40
[ 3264.569115][T11616] ? restore_fpregs_from_fpstate+0xc1/0x1c0
[ 3264.575017][T11616] ? syscall_enter_from_user_mode+0x26/0x80
[ 3264.580906][T11616] ? lockdep_hardirqs_on+0x7d/0x100
[ 3264.586099][T11616] do_syscall_64+0x39/0xb0
[ 3264.590514][T11616] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 3264.596411][T11616] RIP: 0033:0x7f7b21a8c169
[ 3264.600822][T11616] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 3264.620418][T11616] RSP: 002b:00007f7b2276c168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
05:08:45 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3264.628826][T11616] RAX: ffffffffffffffda RBX: 00007f7b21babf80 RCX: 00007f7b21a8c169
[ 3264.636788][T11616] RDX: 000000000000004a RSI: 0000000020000280 RDI: 0000000000000003
[ 3264.644763][T11616] RBP: 00007f7b21ae7ca1 R08: 0000000000000000 R09: 0000000000000000
[ 3264.652723][T11616] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 3264.660682][T11616] R13: 00007f7b21ccfb1f R14: 00007f7b2276c300 R15: 0000000000022000
[ 3264.668651][T11616]
05:08:45 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3264.919528][ C0] net_ratelimit: 2920 callbacks suppressed
[ 3264.919540][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3264.937568][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3264.950042][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3264.962265][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3264.974682][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3264.986856][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3264.999329][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3265.011535][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3265.023691][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3265.035787][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
05:08:45 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, 0x0, 0xc9)
05:08:45 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:45 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], 0xc9)
[ 3265.642723][T11616] memory: usage 307188kB, limit 307200kB, failcnt 6292
[ 3265.665417][T11616] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3265.693382][T11616] Memory cgroup stats for /syz1:
[ 3265.693785][T11616] anon 147456
[ 3265.693785][T11616] file 225280
[ 3265.693785][T11616] kernel 314155008
[ 3265.693785][T11616] kernel_stack 32768
[ 3265.693785][T11616] pagetables 81920
[ 3265.693785][T11616] sec_pagetables 0
[ 3265.693785][T11616] percpu 5434688
[ 3265.693785][T11616] sock 0
[ 3265.693785][T11616] vmalloc 8192
[ 3265.693785][T11616] shmem 225280
[ 3265.693785][T11616] zswap 0
[ 3265.693785][T11616] zswapped 0
[ 3265.693785][T11616] file_mapped 225280
[ 3265.693785][T11616] file_dirty 0
[ 3265.693785][T11616] file_writeback 0
[ 3265.693785][T11616] swapcached 0
[ 3265.693785][T11616] anon_thp 0
[ 3265.693785][T11616] file_thp 0
[ 3265.693785][T11616] shmem_thp 0
[ 3265.693785][T11616] inactive_anon 0
[ 3265.693785][T11616] active_anon 372736
[ 3265.693785][T11616] inactive_file 0
[ 3265.693785][T11616] active_file 0
[ 3265.693785][T11616] unevictable 0
[ 3265.693785][T11616] slab_reclaimable 19752
[ 3265.693785][T11616] slab_unreclaimable 308539560
[ 3265.693785][T11616] slab 308559312
[ 3265.693785][T11616] workingset_refault_anon 0
[ 3265.693785][T11616] workingset_refault_file 0
[ 3265.693785][T11616] workingset_activate_anon 0
[ 3265.693785][T11616] workingset_activate_file 0
[ 3265.693785][T11616] workingset_restore_anon 0
[ 3265.693785][T11616] workingset_restore_file 0
[ 3265.693785][T11616] workingset_nodereclaim 0
[ 3265.693785][T11616] pgscan 0
[ 3265.693785][T11616] pgsteal 0
[ 3265.693785][T11616] pgscan_kswapd 0
[ 3265.693785][T11616] pgscan_direct 0
[ 3265.693785][T11616] pgscan_khugepaged 0
[ 3265.693785][T11616] pgsteal_kswapd 0
[ 3265.693785][T11616] pgsteal_direct 0
[ 3265.693785][T11616] pgsteal_khugepaged 0
[ 3265.693785][T11616] pgfault 647340
[ 3265.693785][T11616] pgmajfault 0
[ 3265.693785][T11616] pgrefill 0
[ 3265.693785][T11616] pgactivate 0
[ 3265.693785][T11616] pgdeactivate 783
[ 3265.693785][T11616] pglazyfree 0
[ 3265.693785][T11616] pglazyfreed 0
[ 3265.693785][T11616] zswpin 0
[ 3265.693785][T11616] zswpout 0
[ 3265.693785][T11616] thp_fault_alloc 0
[ 3266.083842][ T1202] ieee802154 phy0 wpan0: encryption failed: -22
[ 3266.091368][ T1202] ieee802154 phy1 wpan1: encryption failed: -22
[ 3266.888667][T11616] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=11609,uid=0
[ 3266.912176][T11616] Memory cgroup out of memory: Killed process 11616 (syz-executor.1) total-vm:54548kB, anon-rss:512kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:88kB oom_score_adj:1000
05:08:47 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0x4c)
05:08:47 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, 0x0, 0xc9)
05:08:47 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:47 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x0, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:47 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], 0xc9)
05:08:47 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3267.400629][T11640] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000
[ 3267.457642][T11640] CPU: 1 PID: 11640 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3267.466390][T11640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3267.476475][T11640] Call Trace:
[ 3267.479767][T11640]
[ 3267.482710][T11640] dump_stack_lvl+0x136/0x150
[ 3267.487410][T11640] dump_header+0x10a/0xd70
[ 3267.491827][T11640] oom_kill_process+0x25d/0x600
[ 3267.496697][T11640] out_of_memory+0x35c/0x1660
[ 3267.501390][T11640] ? find_held_lock+0x2d/0x110
[ 3267.506189][T11640] ? oom_killer_disable+0x2b0/0x2b0
[ 3267.511398][T11640] ? rcu_read_unlock+0x9/0x60
[ 3267.516102][T11640] ? find_held_lock+0x2d/0x110
[ 3267.520871][T11640] mem_cgroup_out_of_memory+0x206/0x270
[ 3267.526416][T11640] ? mem_cgroup_margin+0x130/0x130
[ 3267.531526][T11640] ? lock_downgrade+0x690/0x690
[ 3267.536381][T11640] try_charge_memcg+0xf9b/0x13b0
[ 3267.541321][T11640] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3267.547337][T11640] ? rcu_read_unlock+0x9/0x60
[ 3267.552017][T11640] ? lock_downgrade+0x690/0x690
[ 3267.556887][T11640] charge_memcg+0x90/0x3b0
[ 3267.561328][T11640] __mem_cgroup_charge+0x2b/0x90
[ 3267.566281][T11640] ? copy_mc_to_kernel+0x3e/0x90
[ 3267.571254][T11640] do_wp_page+0x8eb/0x3520
[ 3267.575711][T11640] ? lock_release+0x670/0x670
[ 3267.580403][T11640] ? finish_mkwrite_fault+0x3d0/0x3d0
[ 3267.585772][T11640] ? do_raw_spin_lock+0x124/0x2b0
[ 3267.590804][T11640] ? spin_bug+0x1c0/0x1c0
[ 3267.595151][T11640] ? lock_downgrade+0x690/0x690
[ 3267.600003][T11640] __handle_mm_fault+0x19a1/0x3e60
[ 3267.605117][T11640] ? vm_iomap_memory+0x190/0x190
[ 3267.610069][T11640] handle_mm_fault+0x2ba/0x9c0
[ 3267.614833][T11640] do_user_addr_fault+0x475/0x1230
[ 3267.619960][T11640] ? rcu_is_watching+0x12/0xb0
[ 3267.624736][T11640] exc_page_fault+0x98/0x170
[ 3267.629327][T11640] asm_exc_page_fault+0x26/0x30
[ 3267.634178][T11640] RIP: 0033:0x7f7b21a36fdd
[ 3267.638590][T11640] Code: e0 04 8b 44 02 08 85 c0 0f 85 3e 0a 00 00 31 c0 b9 40 42 0f 00 ba 81 00 00 00 c7 06 01 00 00 00 bf ca 00 00 00 e8 73 51 05 00 <83> 05 a4 69 17 00 01 80 bc 24 d8 00 00 00 00 0f b6 05 b7 e6 c9 00
[ 3267.658193][T11640] RSP: 002b:00007f7b21ccfba0 EFLAGS: 00010217
[ 3267.664254][T11640] RAX: 0000000000000000 RBX: 00007f7b21babf8c RCX: 00007f7b21a8c169
[ 3267.672226][T11640] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f7b21babf88
[ 3267.680201][T11640] RBP: 00007f7b21babf80 R08: 00007f7b2276c700 R09: 0000000000000000
[ 3267.688181][T11640] R10: 00007f7b2276c700 R11: 0000000000000246 R12: 00007f7b21babf8c
[ 3267.696148][T11640] R13: 00007f7b21600060 R14: 00007f7b21babf80 R15: 0000000000000000
[ 3267.704143][T11640]
05:08:48 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, 0x0, 0xc9)
05:08:48 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:48 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], 0xc9)
05:08:48 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], 0xc9)
[ 3268.670015][T11640] memory: usage 307188kB, limit 307200kB, failcnt 6389
[ 3268.715755][T11640] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3268.741581][T11640] Memory cgroup stats for /syz1:
[ 3268.741728][T11640] anon 102400
[ 3268.741728][T11640] file 225280
[ 3268.741728][T11640] kernel 314232832
[ 3268.741728][T11640] kernel_stack 65536
[ 3268.741728][T11640] pagetables 73728
[ 3268.741728][T11640] sec_pagetables 0
[ 3268.741728][T11640] percpu 5434688
[ 3268.741728][T11640] sock 0
[ 3268.741728][T11640] vmalloc 8192
[ 3268.741728][T11640] shmem 225280
[ 3268.741728][T11640] zswap 0
[ 3268.741728][T11640] zswapped 0
[ 3268.741728][T11640] file_mapped 225280
[ 3268.741728][T11640] file_dirty 0
[ 3268.741728][T11640] file_writeback 0
[ 3268.741728][T11640] swapcached 0
[ 3268.741728][T11640] anon_thp 0
[ 3268.741728][T11640] file_thp 0
[ 3268.741728][T11640] shmem_thp 0
[ 3268.741728][T11640] inactive_anon 0
[ 3268.741728][T11640] active_anon 327680
[ 3268.741728][T11640] inactive_file 0
[ 3268.741728][T11640] active_file 0
[ 3268.741728][T11640] unevictable 0
[ 3268.741728][T11640] slab_reclaimable 31752
[ 3268.741728][T11640] slab_unreclaimable 308578328
[ 3268.741728][T11640] slab 308610080
[ 3268.741728][T11640] workingset_refault_anon 0
[ 3268.741728][T11640] workingset_refault_file 0
[ 3268.741728][T11640] workingset_activate_anon 0
[ 3268.741728][T11640] workingset_activate_file 0
[ 3268.741728][T11640] workingset_restore_anon 0
[ 3268.741728][T11640] workingset_restore_file 0
[ 3268.741728][T11640] workingset_nodereclaim 0
[ 3268.741728][T11640] pgscan 0
[ 3268.741728][T11640] pgsteal 0
[ 3268.741728][T11640] pgscan_kswapd 0
[ 3268.741728][T11640] pgscan_direct 0
[ 3268.741728][T11640] pgscan_khugepaged 0
[ 3268.741728][T11640] pgsteal_kswapd 0
[ 3268.741728][T11640] pgsteal_direct 0
[ 3268.741728][T11640] pgsteal_khugepaged 0
[ 3268.741728][T11640] pgfault 647380
[ 3268.741728][T11640] pgmajfault 0
[ 3268.741728][T11640] pgrefill 0
[ 3268.741728][T11640] pgactivate 0
[ 3268.741728][T11640] pgdeactivate 783
[ 3268.741728][T11640] pglazyfree 0
[ 3268.741728][T11640] pglazyfreed 0
[ 3268.741728][T11640] zswpin 0
[ 3268.741728][T11640] zswpout 0
[ 3268.741728][T11640] thp_fault_alloc 0
05:08:49 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:49 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x0, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3269.953881][T11640] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=11640,uid=0
[ 3269.994023][ C0] net_ratelimit: 2159 callbacks suppressed
[ 3269.994042][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3270.001291][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3270.012257][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3270.024142][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3270.036054][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3270.048795][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3270.060049][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3270.071998][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3270.084520][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3270.096352][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3270.184375][T11640] Memory cgroup out of memory: Killed process 11640 (syz-executor.1) total-vm:54548kB, anon-rss:384kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000
05:08:50 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0x5a)
05:08:50 executing program 5:
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:50 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], 0xc9)
05:08:50 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB], 0xc9)
05:08:50 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x0, 0x9, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3270.459738][T11682] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000
[ 3270.509544][T11682] CPU: 1 PID: 11682 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3270.518263][T11682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3270.528334][T11682] Call Trace:
[ 3270.531612][T11682]
[ 3270.534544][T11682] dump_stack_lvl+0x136/0x150
[ 3270.539236][T11682] dump_header+0x10a/0xd70
[ 3270.543655][T11682] oom_kill_process+0x25d/0x600
[ 3270.548519][T11682] out_of_memory+0x35c/0x1660
[ 3270.553239][T11682] ? find_held_lock+0x2d/0x110
[ 3270.558004][T11682] ? oom_killer_disable+0x2b0/0x2b0
[ 3270.563198][T11682] ? rcu_read_unlock+0x9/0x60
[ 3270.567873][T11682] ? find_held_lock+0x2d/0x110
[ 3270.572652][T11682] mem_cgroup_out_of_memory+0x206/0x270
[ 3270.578198][T11682] ? mem_cgroup_margin+0x130/0x130
[ 3270.583316][T11682] ? lock_downgrade+0x690/0x690
[ 3270.588196][T11682] try_charge_memcg+0xf9b/0x13b0
[ 3270.593138][T11682] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3270.599141][T11682] ? get_mem_cgroup_from_objcg+0xa1/0x280
[ 3270.604865][T11682] ? lock_downgrade+0x690/0x690
[ 3270.609726][T11682] ? lock_downgrade+0x690/0x690
[ 3270.614602][T11682] __memcg_kmem_charge_page+0x16e/0x3c0
[ 3270.620145][T11682] memcg_charge_kernel_stack.part.0+0x6c/0x150
[ 3270.626308][T11682] copy_process+0x13a7/0x7590
[ 3270.630990][T11682] ? __lock_acquire+0xbc5/0x5d40
[ 3270.635929][T11682] ? __cleanup_sighand+0xb0/0xb0
[ 3270.640880][T11682] ? lockdep_hardirqs_on_prepare+0x410/0x410
[ 3270.646880][T11682] ? psi_memstall_leave+0x174/0x250
[ 3270.652108][T11682] ? lock_downgrade+0x690/0x690
[ 3270.656985][T11682] kernel_clone+0xeb/0x890
[ 3270.661402][T11682] ? create_io_thread+0xf0/0xf0
[ 3270.666251][T11682] ? percpu_ref_put_many.constprop.0+0x6a/0x1b0
[ 3270.672493][T11682] ? lock_downgrade+0x690/0x690
[ 3270.677345][T11682] __do_sys_clone+0xba/0x100
[ 3270.681931][T11682] ? kernel_clone+0x890/0x890
[ 3270.686612][T11682] ? syscall_enter_from_user_mode+0x26/0x80
[ 3270.692504][T11682] do_syscall_64+0x39/0xb0
[ 3270.696927][T11682] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 3270.702818][T11682] RIP: 0033:0x7f7b21a8d591
[ 3270.707224][T11682] Code: 48 85 ff 74 3d 48 85 f6 74 38 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 7c 13 74 01 c3 31 ed 58 5f ff d0 48 89 c7 b8 3c 00 00 00
[ 3270.726836][T11682] RSP: 002b:00007f7b21ccfa68 EFLAGS: 00000206 ORIG_RAX: 0000000000000038
[ 3270.735268][T11682] RAX: ffffffffffffffda RBX: 00007f7b2276c700 RCX: 00007f7b21a8d591
[ 3270.743232][T11682] RDX: 00007f7b2276c9d0 RSI: 00007f7b2276c2f0 RDI: 00000000003d0f00
[ 3270.751209][T11682] RBP: 00007f7b21ccfcb0 R08: 00007f7b2276c700 R09: 00007f7b2276c700
[ 3270.759192][T11682] R10: 00007f7b2276c9d0 R11: 0000000000000206 R12: 00007f7b21ccfb1e
[ 3270.767161][T11682] R13: 00007f7b21ccfb1f R14: 00007f7b2276c300 R15: 0000000000022000
[ 3270.775136][T11682]
05:08:51 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:51 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], 0xc9)
05:08:52 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB], 0xc9)
05:08:52 executing program 5:
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:52 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x0, 0x2, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3272.129709][T11682] memory: usage 307152kB, limit 307200kB, failcnt 6460
[ 3272.227180][T11682] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3272.296810][T11682] Memory cgroup stats for /syz1:
[ 3272.296973][T11682] anon 98304
[ 3272.296973][T11682] file 225280
[ 3272.296973][T11682] kernel 314200064
[ 3272.296973][T11682] kernel_stack 32768
[ 3272.296973][T11682] pagetables 73728
[ 3272.296973][T11682] sec_pagetables 0
[ 3272.296973][T11682] percpu 5434688
[ 3272.296973][T11682] sock 0
[ 3272.296973][T11682] vmalloc 8192
[ 3272.296973][T11682] shmem 225280
[ 3272.296973][T11682] zswap 0
[ 3272.296973][T11682] zswapped 0
[ 3272.296973][T11682] file_mapped 225280
[ 3272.296973][T11682] file_dirty 0
[ 3272.296973][T11682] file_writeback 0
[ 3272.296973][T11682] swapcached 0
[ 3272.296973][T11682] anon_thp 0
[ 3272.296973][T11682] file_thp 0
[ 3272.296973][T11682] shmem_thp 0
[ 3272.296973][T11682] inactive_anon 0
[ 3272.296973][T11682] active_anon 323584
[ 3272.296973][T11682] inactive_file 0
[ 3272.296973][T11682] active_file 0
[ 3272.296973][T11682] unevictable 0
[ 3272.296973][T11682] slab_reclaimable 29824
[ 3272.296973][T11682] slab_unreclaimable 308577216
[ 3272.296973][T11682] slab 308607040
[ 3272.296973][T11682] workingset_refault_anon 0
[ 3272.296973][T11682] workingset_refault_file 0
[ 3272.296973][T11682] workingset_activate_anon 0
[ 3272.296973][T11682] workingset_activate_file 0
[ 3272.296973][T11682] workingset_restore_anon 0
[ 3272.296973][T11682] workingset_restore_file 0
[ 3272.296973][T11682] workingset_nodereclaim 0
[ 3272.296973][T11682] pgscan 0
[ 3272.296973][T11682] pgsteal 0
[ 3272.296973][T11682] pgscan_kswapd 0
[ 3272.296973][T11682] pgscan_direct 0
[ 3272.296973][T11682] pgscan_khugepaged 0
[ 3272.296973][T11682] pgsteal_kswapd 0
[ 3272.296973][T11682] pgsteal_direct 0
[ 3272.296973][T11682] pgsteal_khugepaged 0
[ 3272.296973][T11682] pgfault 647418
[ 3272.296973][T11682] pgmajfault 0
[ 3272.296973][T11682] pgrefill 0
[ 3272.296973][T11682] pgactivate 0
[ 3272.296973][T11682] pgdeactivate 783
[ 3272.296973][T11682] pglazyfree 0
[ 3272.296973][T11682] pglazyfreed 0
[ 3272.296973][T11682] zswpin 0
[ 3272.296973][T11682] zswpout 0
[ 3272.296973][T11682] thp_fault_alloc 0
05:08:53 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:53 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3273.032075][T11682] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=11682,uid=0
[ 3273.072343][T11682] Memory cgroup out of memory: Killed process 11682 (syz-executor.1) total-vm:54548kB, anon-rss:384kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000
05:08:54 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0x60)
05:08:54 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB], 0xc9)
05:08:54 executing program 5:
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:54 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:54 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x0, 0x0, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:54 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3274.113689][T11736] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000
[ 3274.194875][T11736] CPU: 0 PID: 11736 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3274.203615][T11736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3274.213661][T11736] Call Trace:
[ 3274.216929][T11736]
[ 3274.219869][T11736] dump_stack_lvl+0x136/0x150
[ 3274.224544][T11736] dump_header+0x10a/0xd70
[ 3274.228958][T11736] oom_kill_process+0x25d/0x600
[ 3274.233803][T11736] out_of_memory+0x35c/0x1660
[ 3274.238482][T11736] ? find_held_lock+0x2d/0x110
[ 3274.243264][T11736] ? oom_killer_disable+0x2b0/0x2b0
[ 3274.248459][T11736] ? rcu_read_unlock+0x9/0x60
[ 3274.253131][T11736] ? find_held_lock+0x2d/0x110
[ 3274.257912][T11736] mem_cgroup_out_of_memory+0x206/0x270
[ 3274.263456][T11736] ? mem_cgroup_margin+0x130/0x130
[ 3274.268572][T11736] ? lock_downgrade+0x690/0x690
[ 3274.273424][T11736] try_charge_memcg+0xf9b/0x13b0
[ 3274.278359][T11736] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3274.284332][T11736] ? rcu_read_unlock+0x9/0x60
[ 3274.289022][T11736] ? lock_downgrade+0x690/0x690
[ 3274.293888][T11736] charge_memcg+0x90/0x3b0
[ 3274.298317][T11736] __mem_cgroup_charge+0x2b/0x90
[ 3274.303251][T11736] do_wp_page+0x8eb/0x3520
[ 3274.307832][T11736] ? lock_release+0x670/0x670
[ 3274.312500][T11736] ? finish_mkwrite_fault+0x3d0/0x3d0
[ 3274.317867][T11736] ? do_raw_spin_lock+0x124/0x2b0
[ 3274.322885][T11736] ? spin_bug+0x1c0/0x1c0
[ 3274.327206][T11736] ? lock_downgrade+0x690/0x690
[ 3274.332051][T11736] __handle_mm_fault+0x19a1/0x3e60
[ 3274.337161][T11736] ? vm_iomap_memory+0x190/0x190
[ 3274.342107][T11736] handle_mm_fault+0x2ba/0x9c0
[ 3274.346891][T11736] do_user_addr_fault+0x475/0x1230
[ 3274.352004][T11736] ? rcu_is_watching+0x12/0xb0
[ 3274.356767][T11736] exc_page_fault+0x98/0x170
[ 3274.361351][T11736] asm_exc_page_fault+0x26/0x30
[ 3274.366195][T11736] RIP: 0033:0x7f7b21a39610
[ 3274.370601][T11736] Code: fe ff 49 39 dc 75 eb 48 8b 44 24 18 89 28 48 83 c4 28 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 44 00 00 41 89 c5 e9 75 fe ff ff <43> 89 2c 84 e9 a3 fe ff ff 0f 1f 80 00 00 00 00 49 39 d4 74 70 48
[ 3274.390199][T11736] RSP: 002b:00007f7b21ccfac0 EFLAGS: 00010246
[ 3274.396255][T11736] RAX: 0000000093b440ed RBX: 00007f7b21bac018 RCX: 0000001b32920000
[ 3274.404215][T11736] RDX: 0000000000000000 RSI: 0000001b32920018 RDI: 000000000c7c3315
[ 3274.412175][T11736] RBP: 0000000093b440ed R08: 00000000000000ed R09: 0000000093b440f1
[ 3274.420143][T11736] R10: 00007f7b21ccfc80 R11: 0000000000000246 R12: 00007f7b21ba0000
[ 3274.428147][T11736] R13: 0000000000000001 R14: 0000000000000003 R15: ffffffff87f993ec
[ 3274.436109][T11736] ? __sock_create+0x2c/0x850
[ 3274.440792][T11736]
05:08:54 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3274.552196][T11736] memory: usage 307200kB, limit 307200kB, failcnt 6550
[ 3274.578032][T11736] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3274.619500][T11736] Memory cgroup stats for /syz1:
[ 3274.619649][T11736] anon 118784
[ 3274.619649][T11736] file 225280
[ 3274.619649][T11736] kernel 314228736
[ 3274.619649][T11736] kernel_stack 65536
[ 3274.619649][T11736] pagetables 73728
[ 3274.619649][T11736] sec_pagetables 0
[ 3274.619649][T11736] percpu 5434688
[ 3274.619649][T11736] sock 0
[ 3274.619649][T11736] vmalloc 8192
[ 3274.619649][T11736] shmem 225280
[ 3274.619649][T11736] zswap 0
[ 3274.619649][T11736] zswapped 0
[ 3274.619649][T11736] file_mapped 225280
[ 3274.619649][T11736] file_dirty 0
[ 3274.619649][T11736] file_writeback 0
[ 3274.619649][T11736] swapcached 0
[ 3274.619649][T11736] anon_thp 0
[ 3274.619649][T11736] file_thp 0
[ 3274.619649][T11736] shmem_thp 0
[ 3274.619649][T11736] inactive_anon 0
[ 3274.619649][T11736] active_anon 344064
[ 3274.619649][T11736] inactive_file 0
[ 3274.619649][T11736] active_file 0
[ 3274.619649][T11736] unevictable 0
[ 3274.619649][T11736] slab_reclaimable 30208
[ 3274.619649][T11736] slab_unreclaimable 308577680
[ 3274.619649][T11736] slab 308607888
[ 3274.619649][T11736] workingset_refault_anon 0
[ 3274.619649][T11736] workingset_refault_file 0
[ 3274.619649][T11736] workingset_activate_anon 0
[ 3274.619649][T11736] workingset_activate_file 0
[ 3274.619649][T11736] workingset_restore_anon 0
[ 3274.619649][T11736] workingset_restore_file 0
[ 3274.619649][T11736] workingset_nodereclaim 0
[ 3274.619649][T11736] pgscan 0
[ 3274.619649][T11736] pgsteal 0
[ 3274.619649][T11736] pgscan_kswapd 0
[ 3274.619649][T11736] pgscan_direct 0
[ 3274.619649][T11736] pgscan_khugepaged 0
[ 3274.619649][T11736] pgsteal_kswapd 0
[ 3274.619649][T11736] pgsteal_direct 0
[ 3274.619649][T11736] pgsteal_khugepaged 0
[ 3274.619649][T11736] pgfault 647465
[ 3274.619649][T11736] pgmajfault 0
[ 3274.619649][T11736] pgrefill 0
[ 3274.619649][T11736] pgactivate 0
[ 3274.619649][T11736] pgdeactivate 783
[ 3274.619649][T11736] pglazyfree 0
[ 3274.619649][T11736] pglazyfreed 0
[ 3274.619649][T11736] zswpin 0
[ 3274.619649][T11736] zswpout 0
[ 3274.619649][T11736] thp_fault_alloc 0
05:08:55 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80a"], 0xc9)
[ 3275.035861][ C1] net_ratelimit: 1924 callbacks suppressed
[ 3275.035877][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3275.053944][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3275.066642][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3275.078807][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3275.091463][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3275.103587][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3275.116225][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
05:08:55 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3275.128337][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3275.140994][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3275.153237][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3275.214319][T11736] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=11736,uid=0
[ 3275.230046][T11736] Memory cgroup out of memory: Killed process 11736 (syz-executor.1) total-vm:54548kB, anon-rss:384kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000
05:08:55 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0x68)
05:08:55 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x0, 0x0, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3275.495315][T11758] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000
[ 3275.579754][T11758] CPU: 1 PID: 11758 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3275.588479][T11758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3275.598556][T11758] Call Trace:
[ 3275.601849][T11758]
[ 3275.604797][T11758] dump_stack_lvl+0x136/0x150
[ 3275.609504][T11758] dump_header+0x10a/0xd70
[ 3275.613956][T11758] oom_kill_process+0x25d/0x600
[ 3275.618838][T11758] out_of_memory+0x35c/0x1660
[ 3275.623552][T11758] ? find_held_lock+0x2d/0x110
[ 3275.628357][T11758] ? oom_killer_disable+0x2b0/0x2b0
[ 3275.633598][T11758] ? rcu_read_unlock+0x9/0x60
[ 3275.638308][T11758] ? find_held_lock+0x2d/0x110
[ 3275.643115][T11758] mem_cgroup_out_of_memory+0x206/0x270
[ 3275.648704][T11758] ? mem_cgroup_margin+0x130/0x130
[ 3275.653846][T11758] ? lock_downgrade+0x690/0x690
[ 3275.658737][T11758] try_charge_memcg+0xf9b/0x13b0
[ 3275.663702][T11758] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3275.669707][T11758] ? get_mem_cgroup_from_objcg+0xa1/0x280
[ 3275.675463][T11758] ? lock_downgrade+0x690/0x690
[ 3275.680385][T11758] ? lock_downgrade+0x690/0x690
[ 3275.685277][T11758] __memcg_kmem_charge_page+0x16e/0x3c0
[ 3275.690849][T11758] memcg_charge_kernel_stack.part.0+0x6c/0x150
[ 3275.697035][T11758] copy_process+0x13a7/0x7590
[ 3275.701746][T11758] ? __lock_acquire+0xbc5/0x5d40
[ 3275.706724][T11758] ? __cleanup_sighand+0xb0/0xb0
[ 3275.711691][T11758] ? lockdep_hardirqs_on_prepare+0x410/0x410
[ 3275.717731][T11758] ? psi_memstall_leave+0x174/0x250
[ 3275.722964][T11758] ? lock_downgrade+0x690/0x690
[ 3275.727846][T11758] kernel_clone+0xeb/0x890
[ 3275.732295][T11758] ? create_io_thread+0xf0/0xf0
[ 3275.737178][T11758] ? percpu_ref_put_many.constprop.0+0x6a/0x1b0
[ 3275.743458][T11758] ? lock_downgrade+0x690/0x690
[ 3275.748343][T11758] __do_sys_clone+0xba/0x100
[ 3275.752962][T11758] ? kernel_clone+0x890/0x890
[ 3275.757680][T11758] ? syscall_enter_from_user_mode+0x26/0x80
[ 3275.763598][T11758] do_syscall_64+0x39/0xb0
[ 3275.768012][T11758] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 3275.773922][T11758] RIP: 0033:0x7f7b21a8d591
[ 3275.778327][T11758] Code: 48 85 ff 74 3d 48 85 f6 74 38 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 7c 13 74 01 c3 31 ed 58 5f ff d0 48 89 c7 b8 3c 00 00 00
[ 3275.797925][T11758] RSP: 002b:00007f7b21ccfa68 EFLAGS: 00000206 ORIG_RAX: 0000000000000038
[ 3275.806328][T11758] RAX: ffffffffffffffda RBX: 00007f7b2276c700 RCX: 00007f7b21a8d591
[ 3275.814291][T11758] RDX: 00007f7b2276c9d0 RSI: 00007f7b2276c2f0 RDI: 00000000003d0f00
[ 3275.822272][T11758] RBP: 00007f7b21ccfcb0 R08: 00007f7b2276c700 R09: 00007f7b2276c700
05:08:56 executing program 5:
open(0x0, 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3275.830250][T11758] R10: 00007f7b2276c9d0 R11: 0000000000000206 R12: 00007f7b21ccfb1e
[ 3275.838211][T11758] R13: 00007f7b21ccfb1f R14: 00007f7b2276c300 R15: 0000000000022000
[ 3275.846185][T11758]
05:08:56 executing program 3:
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:56 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:57 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80a"], 0xc9)
05:08:57 executing program 5:
open(0x0, 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3277.110670][T11758] memory: usage 307192kB, limit 307200kB, failcnt 6621
[ 3277.170882][T11758] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3277.197665][T11758] Memory cgroup stats for /syz1:
[ 3277.197830][T11758] anon 98304
[ 3277.197830][T11758] file 225280
[ 3277.197830][T11758] kernel 314241024
[ 3277.197830][T11758] kernel_stack 32768
[ 3277.197830][T11758] pagetables 73728
[ 3277.197830][T11758] sec_pagetables 0
[ 3277.197830][T11758] percpu 5434752
[ 3277.197830][T11758] sock 0
[ 3277.197830][T11758] vmalloc 8192
[ 3277.197830][T11758] shmem 225280
[ 3277.197830][T11758] zswap 0
[ 3277.197830][T11758] zswapped 0
[ 3277.197830][T11758] file_mapped 225280
[ 3277.197830][T11758] file_dirty 0
[ 3277.197830][T11758] file_writeback 0
[ 3277.197830][T11758] swapcached 0
[ 3277.197830][T11758] anon_thp 0
[ 3277.197830][T11758] file_thp 0
[ 3277.197830][T11758] shmem_thp 0
[ 3277.197830][T11758] inactive_anon 0
[ 3277.197830][T11758] active_anon 323584
[ 3277.197830][T11758] inactive_file 0
[ 3277.197830][T11758] active_file 0
[ 3277.197830][T11758] unevictable 0
[ 3277.197830][T11758] slab_reclaimable 41824
[ 3277.197830][T11758] slab_unreclaimable 308602072
[ 3277.197830][T11758] slab 308643896
[ 3277.197830][T11758] workingset_refault_anon 0
[ 3277.197830][T11758] workingset_refault_file 0
[ 3277.197830][T11758] workingset_activate_anon 0
[ 3277.197830][T11758] workingset_activate_file 0
[ 3277.197830][T11758] workingset_restore_anon 0
[ 3277.197830][T11758] workingset_restore_file 0
[ 3277.197830][T11758] workingset_nodereclaim 0
[ 3277.197830][T11758] pgscan 0
[ 3277.197830][T11758] pgsteal 0
[ 3277.197830][T11758] pgscan_kswapd 0
[ 3277.197830][T11758] pgscan_direct 0
[ 3277.197830][T11758] pgscan_khugepaged 0
[ 3277.197830][T11758] pgsteal_kswapd 0
[ 3277.197830][T11758] pgsteal_direct 0
[ 3277.197830][T11758] pgsteal_khugepaged 0
[ 3277.197830][T11758] pgfault 647500
[ 3277.197830][T11758] pgmajfault 0
[ 3277.197830][T11758] pgrefill 0
[ 3277.197830][T11758] pgactivate 0
[ 3277.197830][T11758] pgdeactivate 783
[ 3277.197830][T11758] pglazyfree 0
[ 3277.197830][T11758] pglazyfreed 0
[ 3277.197830][T11758] zswpin 0
[ 3277.197830][T11758] zswpout 0
[ 3277.197830][T11758] thp_fault_alloc 0
05:08:57 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x0, 0x0, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:58 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
getpid()
process_vm_readv(0x0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, r0, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:58 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80a"], 0xc9)
05:08:58 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80a"], 0xc9)
05:08:58 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
getpid()
process_vm_readv(0x0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, r0, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3278.224138][T11758] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=11758,uid=0
[ 3278.585190][T11758] Memory cgroup out of memory: Killed process 11758 (syz-executor.1) total-vm:54548kB, anon-rss:384kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000
05:08:59 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0x6c)
05:08:59 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
getpid()
process_vm_readv(0x0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, r0, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:59 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80a"], 0xc9)
05:08:59 executing program 5:
open(0x0, 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:59 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x0, 0x0, 0x0, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:08:59 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e"], 0xc9)
05:08:59 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, 0x0, 0x0, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:00 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, 0x0, 0x0, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3279.884639][T11811] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000
[ 3279.952433][T11811] CPU: 0 PID: 11811 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3279.961174][T11811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3279.971228][T11811] Call Trace:
[ 3279.974501][T11811]
[ 3279.977434][T11811] dump_stack_lvl+0x136/0x150
[ 3279.982123][T11811] dump_header+0x10a/0xd70
[ 3279.986539][T11811] oom_kill_process+0x25d/0x600
[ 3279.991405][T11811] out_of_memory+0x35c/0x1660
[ 3279.996120][T11811] ? find_held_lock+0x2d/0x110
[ 3280.000908][T11811] ? oom_killer_disable+0x2b0/0x2b0
[ 3280.006123][T11811] ? rcu_read_unlock+0x9/0x60
[ 3280.010844][T11811] ? find_held_lock+0x2d/0x110
[ 3280.015649][T11811] mem_cgroup_out_of_memory+0x206/0x270
[ 3280.021211][T11811] ? mem_cgroup_margin+0x130/0x130
[ 3280.026331][T11811] ? lock_downgrade+0x690/0x690
[ 3280.031203][T11811] try_charge_memcg+0xf9b/0x13b0
[ 3280.036147][T11811] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3280.042139][T11811] ? rcu_read_unlock+0x9/0x60
[ 3280.046857][T11811] ? lock_downgrade+0x690/0x690
[ 3280.051767][T11811] charge_memcg+0x90/0x3b0
[ 3280.056203][T11811] __mem_cgroup_charge+0x2b/0x90
[ 3280.061141][T11811] do_wp_page+0x8eb/0x3520
[ 3280.065558][T11811] ? lock_release+0x670/0x670
[ 3280.070233][T11811] ? finish_mkwrite_fault+0x3d0/0x3d0
[ 3280.075604][T11811] ? do_raw_spin_lock+0x124/0x2b0
[ 3280.080625][T11811] ? spin_bug+0x1c0/0x1c0
[ 3280.084948][T11811] ? lock_downgrade+0x690/0x690
[ 3280.089816][T11811] __handle_mm_fault+0x19a1/0x3e60
[ 3280.094945][T11811] ? vm_iomap_memory+0x190/0x190
[ 3280.099893][T11811] handle_mm_fault+0x2ba/0x9c0
[ 3280.104658][T11811] do_user_addr_fault+0x475/0x1230
[ 3280.109768][T11811] ? rcu_is_watching+0x12/0xb0
[ 3280.114532][T11811] exc_page_fault+0x98/0x170
[ 3280.119120][T11811] asm_exc_page_fault+0x26/0x30
[ 3280.123966][T11811] RIP: 0033:0x7f7b21a39610
[ 3280.128373][T11811] Code: fe ff 49 39 dc 75 eb 48 8b 44 24 18 89 28 48 83 c4 28 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 44 00 00 41 89 c5 e9 75 fe ff ff <43> 89 2c 84 e9 a3 fe ff ff 0f 1f 80 00 00 00 00 49 39 d4 74 70 48
[ 3280.147973][T11811] RSP: 002b:00007f7b21ccfac0 EFLAGS: 00010246
[ 3280.154029][T11811] RAX: 0000000093b440ed RBX: 00007f7b21bac018 RCX: 0000001b32920000
[ 3280.161989][T11811] RDX: 0000000000000000 RSI: 0000001b32920018 RDI: 000000000c7c3315
[ 3280.169952][T11811] RBP: 0000000093b440ed R08: 00000000000000ed R09: 0000000093b440f1
[ 3280.177917][T11811] R10: 00007f7b21ccfc80 R11: 0000000000000246 R12: 00007f7b21ba0000
[ 3280.185890][T11811] R13: 0000000000000001 R14: 0000000000000003 R15: ffffffff87f993ec
[ 3280.193870][T11811] ? __sock_create+0x2c/0x850
[ 3280.198573][T11811]
[ 3280.242841][ C1] net_ratelimit: 2266 callbacks suppressed
[ 3280.242858][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3280.261307][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3280.277514][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3280.290050][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3280.302161][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3280.314669][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3280.326779][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3280.339268][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3280.351371][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3280.363824][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
05:09:00 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, 0x0, 0x0, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:01 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x0, 0x0, 0x0, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:01 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:01 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80a"], 0xc9)
[ 3281.840099][T11811] memory: usage 307200kB, limit 307200kB, failcnt 6683
[ 3281.878431][T11811] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3281.897941][T11811] Memory cgroup stats for /syz1:
[ 3281.900059][T11811] anon 118784
[ 3281.900059][T11811] file 225280
[ 3281.900059][T11811] kernel 314228736
[ 3281.900059][T11811] kernel_stack 65536
[ 3281.900059][T11811] pagetables 73728
[ 3281.900059][T11811] sec_pagetables 0
[ 3281.900059][T11811] percpu 5434688
[ 3281.900059][T11811] sock 0
[ 3281.900059][T11811] vmalloc 8192
[ 3281.900059][T11811] shmem 225280
[ 3281.900059][T11811] zswap 0
[ 3281.900059][T11811] zswapped 0
[ 3281.900059][T11811] file_mapped 225280
[ 3281.900059][T11811] file_dirty 0
[ 3281.900059][T11811] file_writeback 0
[ 3281.900059][T11811] swapcached 0
[ 3281.900059][T11811] anon_thp 0
[ 3281.900059][T11811] file_thp 0
[ 3281.900059][T11811] shmem_thp 0
[ 3281.900059][T11811] inactive_anon 0
[ 3281.900059][T11811] active_anon 344064
[ 3281.900059][T11811] inactive_file 0
[ 3281.900059][T11811] active_file 0
[ 3281.900059][T11811] unevictable 0
[ 3281.900059][T11811] slab_reclaimable 30208
[ 3281.900059][T11811] slab_unreclaimable 308577032
[ 3281.900059][T11811] slab 308607240
[ 3281.900059][T11811] workingset_refault_anon 0
[ 3281.900059][T11811] workingset_refault_file 0
[ 3281.900059][T11811] workingset_activate_anon 0
[ 3281.900059][T11811] workingset_activate_file 0
[ 3281.900059][T11811] workingset_restore_anon 0
[ 3281.900059][T11811] workingset_restore_file 0
[ 3281.900059][T11811] workingset_nodereclaim 0
[ 3281.900059][T11811] pgscan 0
[ 3281.900059][T11811] pgsteal 0
[ 3281.900059][T11811] pgscan_kswapd 0
[ 3281.900059][T11811] pgscan_direct 0
[ 3281.900059][T11811] pgscan_khugepaged 0
[ 3281.900059][T11811] pgsteal_kswapd 0
[ 3281.900059][T11811] pgsteal_direct 0
[ 3281.900059][T11811] pgsteal_khugepaged 0
[ 3281.900059][T11811] pgfault 647547
[ 3281.900059][T11811] pgmajfault 0
[ 3281.900059][T11811] pgrefill 0
[ 3281.900059][T11811] pgactivate 0
[ 3281.900059][T11811] pgdeactivate 783
[ 3281.900059][T11811] pglazyfree 0
[ 3281.900059][T11811] pglazyfreed 0
[ 3281.900059][T11811] zswpin 0
[ 3281.900059][T11811] zswpout 0
[ 3281.900059][T11811] thp_fault_alloc 0
[ 3282.170891][T11811] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=11811,uid=0
[ 3282.808615][T11811] Memory cgroup out of memory: Killed process 11811 (syz-executor.1) total-vm:54548kB, anon-rss:384kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000
05:09:03 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0x74)
05:09:03 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e"], 0xc9)
05:09:03 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}], 0x1, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:03 executing program 3:
open(0x0, 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:03 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:03 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:03 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}], 0x1, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3283.347055][T11855] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000
[ 3283.369780][T11855] CPU: 0 PID: 11855 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3283.378504][T11855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3283.388573][T11855] Call Trace:
[ 3283.391849][T11855]
[ 3283.394773][T11855] dump_stack_lvl+0x136/0x150
[ 3283.399457][T11855] dump_header+0x10a/0xd70
[ 3283.403879][T11855] oom_kill_process+0x25d/0x600
[ 3283.408752][T11855] out_of_memory+0x35c/0x1660
[ 3283.413434][T11855] ? find_held_lock+0x2d/0x110
[ 3283.418213][T11855] ? oom_killer_disable+0x2b0/0x2b0
[ 3283.423408][T11855] ? rcu_read_unlock+0x9/0x60
[ 3283.428083][T11855] ? find_held_lock+0x2d/0x110
[ 3283.432847][T11855] mem_cgroup_out_of_memory+0x206/0x270
[ 3283.438401][T11855] ? mem_cgroup_margin+0x130/0x130
[ 3283.443510][T11855] ? lock_downgrade+0x690/0x690
[ 3283.448376][T11855] try_charge_memcg+0xf9b/0x13b0
[ 3283.453330][T11855] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3283.459330][T11855] ? get_mem_cgroup_from_objcg+0xa1/0x280
[ 3283.465051][T11855] ? lock_downgrade+0x690/0x690
[ 3283.469901][T11855] ? lock_downgrade+0x690/0x690
[ 3283.474750][T11855] __memcg_kmem_charge_page+0x16e/0x3c0
[ 3283.480289][T11855] memcg_charge_kernel_stack.part.0+0x6c/0x150
[ 3283.486475][T11855] copy_process+0x13a7/0x7590
[ 3283.491152][T11855] ? lockdep_hardirqs_on_prepare+0x410/0x410
[ 3283.497123][T11855] ? psi_task_switch+0x216/0x950
[ 3283.502066][T11855] ? __cleanup_sighand+0xb0/0xb0
[ 3283.507001][T11855] ? finish_task_switch.isra.0+0x2b0/0xc80
[ 3283.512800][T11855] ? lock_downgrade+0x690/0x690
[ 3283.517653][T11855] kernel_clone+0xeb/0x890
[ 3283.522061][T11855] ? finish_task_switch.isra.0+0x2b5/0xc80
[ 3283.527860][T11855] ? create_io_thread+0xf0/0xf0
[ 3283.532710][T11855] ? __schedule+0xc99/0x5770
[ 3283.537304][T11855] __do_sys_clone+0xba/0x100
[ 3283.541895][T11855] ? kernel_clone+0x890/0x890
[ 3283.546569][T11855] ? xfd_validate_state+0x5d/0x180
[ 3283.551681][T11855] ? syscall_enter_from_user_mode+0x26/0x80
[ 3283.557573][T11855] do_syscall_64+0x39/0xb0
[ 3283.561990][T11855] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 3283.567886][T11855] RIP: 0033:0x7f7b21a8d591
[ 3283.572293][T11855] Code: 48 85 ff 74 3d 48 85 f6 74 38 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 7c 13 74 01 c3 31 ed 58 5f ff d0 48 89 c7 b8 3c 00 00 00
[ 3283.591932][T11855] RSP: 002b:00007f7b21ccfa68 EFLAGS: 00000206 ORIG_RAX: 0000000000000038
[ 3283.600335][T11855] RAX: ffffffffffffffda RBX: 00007f7b2276c700 RCX: 00007f7b21a8d591
[ 3283.608297][T11855] RDX: 00007f7b2276c9d0 RSI: 00007f7b2276c2f0 RDI: 00000000003d0f00
[ 3283.616269][T11855] RBP: 00007f7b21ccfcb0 R08: 00007f7b2276c700 R09: 00007f7b2276c700
[ 3283.624227][T11855] R10: 00007f7b2276c9d0 R11: 0000000000000206 R12: 00007f7b21ccfb1e
[ 3283.632204][T11855] R13: 00007f7b21ccfb1f R14: 00007f7b2276c300 R15: 0000000000022000
[ 3283.640173][T11855]
05:09:04 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:04 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}], 0x1, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:04 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:04 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {0x0}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:04 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e"], 0xc9)
[ 3284.474428][T11855] memory: usage 307200kB, limit 307200kB, failcnt 6758
[ 3284.506117][T11855] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3284.521313][T11855] Memory cgroup stats for /syz1:
[ 3284.521502][T11855] anon 98304
[ 3284.521502][T11855] file 225280
[ 3284.521502][T11855] kernel 314249216
[ 3284.521502][T11855] kernel_stack 32768
[ 3284.521502][T11855] pagetables 73728
[ 3284.521502][T11855] sec_pagetables 0
[ 3284.521502][T11855] percpu 5434752
[ 3284.521502][T11855] sock 0
[ 3284.521502][T11855] vmalloc 8192
[ 3284.521502][T11855] shmem 225280
[ 3284.521502][T11855] zswap 0
[ 3284.521502][T11855] zswapped 0
[ 3284.521502][T11855] file_mapped 225280
[ 3284.521502][T11855] file_dirty 0
[ 3284.521502][T11855] file_writeback 0
[ 3284.521502][T11855] swapcached 0
[ 3284.521502][T11855] anon_thp 0
[ 3284.521502][T11855] file_thp 0
[ 3284.521502][T11855] shmem_thp 0
[ 3284.521502][T11855] inactive_anon 0
[ 3284.521502][T11855] active_anon 323584
[ 3284.521502][T11855] inactive_file 0
[ 3284.521502][T11855] active_file 0
[ 3284.521502][T11855] unevictable 0
[ 3284.521502][T11855] slab_reclaimable 40280
[ 3284.521502][T11855] slab_unreclaimable 308608600
[ 3284.521502][T11855] slab 308648880
[ 3284.521502][T11855] workingset_refault_anon 0
[ 3284.521502][T11855] workingset_refault_file 0
[ 3284.521502][T11855] workingset_activate_anon 0
[ 3284.521502][T11855] workingset_activate_file 0
[ 3284.521502][T11855] workingset_restore_anon 0
[ 3284.521502][T11855] workingset_restore_file 0
[ 3284.521502][T11855] workingset_nodereclaim 0
[ 3284.521502][T11855] pgscan 0
[ 3284.521502][T11855] pgsteal 0
[ 3284.521502][T11855] pgscan_kswapd 0
[ 3284.521502][T11855] pgscan_direct 0
[ 3284.521502][T11855] pgscan_khugepaged 0
[ 3284.521502][T11855] pgsteal_kswapd 0
[ 3284.521502][T11855] pgsteal_direct 0
[ 3284.521502][T11855] pgsteal_khugepaged 0
[ 3284.521502][T11855] pgfault 647585
[ 3284.521502][T11855] pgmajfault 0
[ 3284.521502][T11855] pgrefill 0
[ 3284.521502][T11855] pgactivate 0
[ 3284.521502][T11855] pgdeactivate 783
[ 3284.521502][T11855] pglazyfree 0
[ 3284.521502][T11855] pglazyfreed 0
[ 3284.521502][T11855] zswpin 0
[ 3284.521502][T11855] zswpout 0
[ 3284.521502][T11855] thp_fault_alloc 0
[ 3285.172994][T11855] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=11855,uid=0
[ 3285.248647][ C0] net_ratelimit: 2758 callbacks suppressed
[ 3285.248660][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3285.266708][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3285.278840][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3285.290919][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3285.303345][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3285.315518][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3285.327655][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3285.339714][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
05:09:05 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0x7a)
05:09:05 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:05 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {0x0}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3285.383258][T11855] Memory cgroup out of memory: Killed process 11855 (syz-executor.1) total-vm:54548kB, anon-rss:384kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000
[ 3285.405280][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3285.418275][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3285.590661][T11889] syz-executor.1 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000
[ 3285.648104][T11889] CPU: 0 PID: 11889 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3285.656834][T11889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3285.666881][T11889] Call Trace:
[ 3285.670152][T11889]
[ 3285.673076][T11889] dump_stack_lvl+0x136/0x150
[ 3285.677752][T11889] dump_header+0x10a/0xd70
[ 3285.682185][T11889] oom_kill_process+0x25d/0x600
[ 3285.687047][T11889] out_of_memory+0x35c/0x1660
[ 3285.691729][T11889] ? find_held_lock+0x2d/0x110
[ 3285.696501][T11889] ? oom_killer_disable+0x2b0/0x2b0
[ 3285.701700][T11889] ? rcu_read_unlock+0x9/0x60
[ 3285.706376][T11889] ? find_held_lock+0x2d/0x110
[ 3285.711143][T11889] mem_cgroup_out_of_memory+0x206/0x270
[ 3285.716688][T11889] ? mem_cgroup_margin+0x130/0x130
[ 3285.721795][T11889] ? lock_downgrade+0x690/0x690
[ 3285.726647][T11889] try_charge_memcg+0xf9b/0x13b0
[ 3285.731581][T11889] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3285.737553][T11889] ? get_mem_cgroup_from_objcg+0xa1/0x280
[ 3285.743272][T11889] ? lock_downgrade+0x690/0x690
[ 3285.748126][T11889] ? lock_downgrade+0x690/0x690
[ 3285.752978][T11889] __memcg_kmem_charge_page+0x16e/0x3c0
[ 3285.758520][T11889] __alloc_pages+0x1f3/0x4a0
[ 3285.763122][T11889] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170
[ 3285.769876][T11889] ? find_held_lock+0x2d/0x110
[ 3285.774641][T11889] ? lock_downgrade+0x690/0x690
[ 3285.779483][T11889] ? do_raw_spin_lock+0x124/0x2b0
[ 3285.784504][T11889] alloc_pages+0x1aa/0x270
[ 3285.788923][T11889] __pmd_alloc+0x3f/0x5d0
[ 3285.793244][T11889] ? __pud_alloc+0xe4/0x180
[ 3285.797740][T11889] __handle_mm_fault+0x932/0x3e60
[ 3285.802762][T11889] ? vm_iomap_memory+0x190/0x190
[ 3285.807704][T11889] handle_mm_fault+0x2ba/0x9c0
[ 3285.812463][T11889] do_user_addr_fault+0x475/0x1230
[ 3285.817573][T11889] ? rcu_is_watching+0x12/0xb0
[ 3285.822335][T11889] exc_page_fault+0x98/0x170
[ 3285.826922][T11889] asm_exc_page_fault+0x26/0x30
[ 3285.831770][T11889] RIP: 0033:0x7f7b21a27766
[ 3285.836193][T11889] Code: ff ff 66 90 48 8b 0d 89 df ca 00 4c 63 05 72 df ca 00 48 8b 05 73 df ca 00 49 01 c8 48 39 c8 72 13 4c 39 c0 73 0e 48 8d 50 04 <89> 38 48 89 15 59 df ca 00 c3 52 48 8d 35 e2 f1 0b 00 48 89 c2 48
[ 3285.855799][T11889] RSP: 002b:00007f7b21ccfb98 EFLAGS: 00010287
[ 3285.861859][T11889] RAX: 0000001b32920000 RBX: 0000000000000003 RCX: 0000001b32920000
[ 3285.869821][T11889] RDX: 0000001b32920004 RSI: 00000000003c0000 RDI: 0000000000000000
[ 3285.877782][T11889] RBP: 0000000000000000 R08: 0000001b32d20000 R09: 0000000000040000
[ 3285.885743][T11889] R10: 0000000000000011 R11: 0000000000000000 R12: 0000000000000001
[ 3285.893703][T11889] R13: 0000000000000000 R14: 0000000000000001 R15: 00007f7b21ccfe40
[ 3285.901673][T11889]
05:09:06 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:06 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:06 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a77"], 0xc9)
05:09:06 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {0x0}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3286.564876][T11889] memory: usage 307200kB, limit 307200kB, failcnt 6841
[ 3286.628629][T11889] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3286.651923][T11889] Memory cgroup stats for /syz1:
[ 3286.652177][T11889] anon 86016
[ 3286.652177][T11889] file 225280
[ 3286.652177][T11889] kernel 314261504
[ 3286.652177][T11889] kernel_stack 32768
[ 3286.652177][T11889] pagetables 61440
[ 3286.652177][T11889] sec_pagetables 0
[ 3286.652177][T11889] percpu 5434816
[ 3286.652177][T11889] sock 0
[ 3286.652177][T11889] vmalloc 8192
[ 3286.652177][T11889] shmem 225280
[ 3286.652177][T11889] zswap 0
[ 3286.652177][T11889] zswapped 0
[ 3286.652177][T11889] file_mapped 225280
[ 3286.652177][T11889] file_dirty 0
[ 3286.652177][T11889] file_writeback 0
[ 3286.652177][T11889] swapcached 0
[ 3286.652177][T11889] anon_thp 0
[ 3286.652177][T11889] file_thp 0
[ 3286.652177][T11889] shmem_thp 0
[ 3286.652177][T11889] inactive_anon 0
[ 3286.652177][T11889] active_anon 311296
[ 3286.652177][T11889] inactive_file 0
[ 3286.652177][T11889] active_file 0
[ 3286.652177][T11889] unevictable 0
[ 3286.652177][T11889] slab_reclaimable 52280
[ 3286.652177][T11889] slab_unreclaimable 308625096
[ 3286.652177][T11889] slab 308677376
[ 3286.652177][T11889] workingset_refault_anon 0
[ 3286.652177][T11889] workingset_refault_file 0
[ 3286.652177][T11889] workingset_activate_anon 0
[ 3286.652177][T11889] workingset_activate_file 0
[ 3286.652177][T11889] workingset_restore_anon 0
[ 3286.652177][T11889] workingset_restore_file 0
[ 3286.652177][T11889] workingset_nodereclaim 0
[ 3286.652177][T11889] pgscan 0
[ 3286.652177][T11889] pgsteal 0
[ 3286.652177][T11889] pgscan_kswapd 0
[ 3286.652177][T11889] pgscan_direct 0
[ 3286.652177][T11889] pgscan_khugepaged 0
[ 3286.652177][T11889] pgsteal_kswapd 0
[ 3286.652177][T11889] pgsteal_direct 0
[ 3286.652177][T11889] pgsteal_khugepaged 0
[ 3286.652177][T11889] pgfault 647617
[ 3286.652177][T11889] pgmajfault 0
[ 3286.652177][T11889] pgrefill 0
[ 3286.652177][T11889] pgactivate 0
[ 3286.652177][T11889] pgdeactivate 783
[ 3286.652177][T11889] pglazyfree 0
[ 3286.652177][T11889] pglazyfreed 0
[ 3286.652177][T11889] zswpin 0
[ 3286.652177][T11889] zswpout 0
[ 3286.652177][T11889] thp_fault_alloc 0
05:09:07 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000006180)=""/152, 0x98}], 0x1, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3287.052148][T11889] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=11889,uid=0
[ 3287.189944][T11889] Memory cgroup out of memory: Killed process 11889 (syz-executor.1) total-vm:54416kB, anon-rss:384kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:68kB oom_score_adj:1000
05:09:07 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000006180)=""/152, 0x98}], 0x1, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:07 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000006180)=""/152, 0x98}], 0x1, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:07 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:07 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:08 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0xba)
05:09:08 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x0, 0x0, 0x0, 0x0, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:08 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{0x0}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:08 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a77"], 0xc9)
05:09:08 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:08 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{0x0}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3288.405173][T11935] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000
[ 3288.512026][T11935] CPU: 1 PID: 11935 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3288.520768][T11935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3288.530835][T11935] Call Trace:
[ 3288.534106][T11935]
[ 3288.537034][T11935] dump_stack_lvl+0x136/0x150
[ 3288.541724][T11935] dump_header+0x10a/0xd70
[ 3288.546170][T11935] oom_kill_process+0x25d/0x600
[ 3288.551051][T11935] out_of_memory+0x35c/0x1660
[ 3288.555742][T11935] ? find_held_lock+0x2d/0x110
[ 3288.560515][T11935] ? oom_killer_disable+0x2b0/0x2b0
[ 3288.565722][T11935] ? rcu_read_unlock+0x9/0x60
[ 3288.570432][T11935] ? find_held_lock+0x2d/0x110
[ 3288.575219][T11935] mem_cgroup_out_of_memory+0x206/0x270
[ 3288.580820][T11935] ? mem_cgroup_margin+0x130/0x130
[ 3288.585931][T11935] ? lock_downgrade+0x690/0x690
[ 3288.590810][T11935] try_charge_memcg+0xf9b/0x13b0
[ 3288.595747][T11935] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3288.601723][T11935] ? get_mem_cgroup_from_objcg+0xa1/0x280
[ 3288.607446][T11935] ? lock_downgrade+0x690/0x690
[ 3288.612292][T11935] ? lock_downgrade+0x690/0x690
[ 3288.617161][T11935] __memcg_kmem_charge_page+0x16e/0x3c0
[ 3288.622725][T11935] memcg_charge_kernel_stack.part.0+0x6c/0x150
[ 3288.628902][T11935] copy_process+0x4e3/0x7590
[ 3288.633495][T11935] ? __lock_acquire+0xbc5/0x5d40
[ 3288.638433][T11935] ? __cleanup_sighand+0xb0/0xb0
[ 3288.643376][T11935] ? lockdep_hardirqs_on_prepare+0x410/0x410
[ 3288.649354][T11935] ? psi_memstall_leave+0x174/0x250
[ 3288.654566][T11935] ? lock_downgrade+0x690/0x690
[ 3288.659419][T11935] kernel_clone+0xeb/0x890
[ 3288.663837][T11935] ? create_io_thread+0xf0/0xf0
[ 3288.668698][T11935] ? percpu_ref_put_many.constprop.0+0x6a/0x1b0
[ 3288.674970][T11935] ? lock_downgrade+0x690/0x690
[ 3288.679851][T11935] __do_sys_clone+0xba/0x100
[ 3288.684476][T11935] ? kernel_clone+0x890/0x890
[ 3288.689168][T11935] ? syscall_enter_from_user_mode+0x26/0x80
[ 3288.695064][T11935] do_syscall_64+0x39/0xb0
[ 3288.699483][T11935] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 3288.705390][T11935] RIP: 0033:0x7f7b21a8d591
[ 3288.709829][T11935] Code: 48 85 ff 74 3d 48 85 f6 74 38 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 7c 13 74 01 c3 31 ed 58 5f ff d0 48 89 c7 b8 3c 00 00 00
[ 3288.729464][T11935] RSP: 002b:00007f7b21ccfa68 EFLAGS: 00000206 ORIG_RAX: 0000000000000038
[ 3288.737909][T11935] RAX: ffffffffffffffda RBX: 00007f7b2276c700 RCX: 00007f7b21a8d591
[ 3288.745905][T11935] RDX: 00007f7b2276c9d0 RSI: 00007f7b2276c2f0 RDI: 00000000003d0f00
[ 3288.753881][T11935] RBP: 00007f7b21ccfcb0 R08: 00007f7b2276c700 R09: 00007f7b2276c700
[ 3288.761848][T11935] R10: 00007f7b2276c9d0 R11: 0000000000000206 R12: 00007f7b21ccfb1e
[ 3288.769813][T11935] R13: 00007f7b21ccfb1f R14: 00007f7b2276c300 R15: 0000000000022000
[ 3288.777788][T11935]
05:09:09 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x0, 0x0, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:09 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{0x0}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3288.990994][T11935] memory: usage 307200kB, limit 307200kB, failcnt 6930
05:09:09 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3289.046693][T11935] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3289.065693][T11935] Memory cgroup stats for /syz1:
[ 3289.065845][T11935] anon 98304
[ 3289.065845][T11935] file 225280
[ 3289.065845][T11935] kernel 314249216
[ 3289.065845][T11935] kernel_stack 32768
[ 3289.065845][T11935] pagetables 73728
[ 3289.065845][T11935] sec_pagetables 0
[ 3289.065845][T11935] percpu 5434752
[ 3289.065845][T11935] sock 0
[ 3289.065845][T11935] vmalloc 8192
[ 3289.065845][T11935] shmem 225280
[ 3289.065845][T11935] zswap 0
[ 3289.065845][T11935] zswapped 0
[ 3289.065845][T11935] file_mapped 225280
[ 3289.065845][T11935] file_dirty 0
[ 3289.065845][T11935] file_writeback 0
[ 3289.065845][T11935] swapcached 0
[ 3289.065845][T11935] anon_thp 0
[ 3289.065845][T11935] file_thp 0
[ 3289.065845][T11935] shmem_thp 0
[ 3289.065845][T11935] inactive_anon 0
[ 3289.065845][T11935] active_anon 323584
[ 3289.065845][T11935] inactive_file 0
[ 3289.065845][T11935] active_file 0
[ 3289.065845][T11935] unevictable 0
[ 3289.065845][T11935] slab_reclaimable 40280
[ 3289.065845][T11935] slab_unreclaimable 308601728
[ 3289.065845][T11935] slab 308642008
[ 3289.065845][T11935] workingset_refault_anon 0
[ 3289.065845][T11935] workingset_refault_file 0
[ 3289.065845][T11935] workingset_activate_anon 0
[ 3289.065845][T11935] workingset_activate_file 0
[ 3289.065845][T11935] workingset_restore_anon 0
[ 3289.065845][T11935] workingset_restore_file 0
[ 3289.065845][T11935] workingset_nodereclaim 0
[ 3289.065845][T11935] pgscan 0
[ 3289.065845][T11935] pgsteal 0
[ 3289.065845][T11935] pgscan_kswapd 0
[ 3289.065845][T11935] pgscan_direct 0
[ 3289.065845][T11935] pgscan_khugepaged 0
[ 3289.065845][T11935] pgsteal_kswapd 0
[ 3289.065845][T11935] pgsteal_direct 0
[ 3289.065845][T11935] pgsteal_khugepaged 0
[ 3289.065845][T11935] pgfault 647652
[ 3289.065845][T11935] pgmajfault 0
[ 3289.065845][T11935] pgrefill 0
[ 3289.065845][T11935] pgactivate 0
[ 3289.065845][T11935] pgdeactivate 783
[ 3289.065845][T11935] pglazyfree 0
[ 3289.065845][T11935] pglazyfreed 0
[ 3289.065845][T11935] zswpin 0
[ 3289.065845][T11935] zswpout 0
[ 3289.065845][T11935] thp_fault_alloc 0
05:09:09 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x0, 0x0, 0x0, 0x0, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:10 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a77"], 0xc9)
05:09:10 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, 0x0, 0x0, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3289.821747][T11935] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=11935,uid=0
[ 3289.848781][T11935] Memory cgroup out of memory: Killed process 11935 (syz-executor.1) total-vm:54548kB, anon-rss:384kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000
05:09:10 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0xf0)
05:09:10 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, 0x0, 0x0, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3290.274914][ C0] net_ratelimit: 2093 callbacks suppressed
[ 3290.274928][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3290.293744][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3290.305904][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3290.317996][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3290.330752][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3290.342921][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3290.355033][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3290.367104][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3290.379553][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3290.391695][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
05:09:11 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, 0x0, 0x0, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:11 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x0, 0x0, 0x0, 0x0, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:11 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:11 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x0, 0x0, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:11 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640), 0x0, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3291.284078][T11971] syz-executor.1 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000
[ 3291.361125][T11971] CPU: 0 PID: 11971 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3291.369867][T11971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3291.379942][T11971] Call Trace:
[ 3291.383229][T11971]
[ 3291.386161][T11971] dump_stack_lvl+0x136/0x150
[ 3291.390842][T11971] dump_header+0x10a/0xd70
[ 3291.395264][T11971] oom_kill_process+0x25d/0x600
[ 3291.400124][T11971] out_of_memory+0x35c/0x1660
[ 3291.404825][T11971] ? find_held_lock+0x2d/0x110
[ 3291.409610][T11971] ? oom_killer_disable+0x2b0/0x2b0
[ 3291.414808][T11971] ? rcu_read_unlock+0x9/0x60
[ 3291.419485][T11971] ? find_held_lock+0x2d/0x110
[ 3291.424250][T11971] mem_cgroup_out_of_memory+0x206/0x270
[ 3291.429822][T11971] ? mem_cgroup_margin+0x130/0x130
[ 3291.434930][T11971] ? lock_downgrade+0x690/0x690
[ 3291.439784][T11971] try_charge_memcg+0xf9b/0x13b0
[ 3291.444732][T11971] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3291.450728][T11971] ? get_mem_cgroup_from_objcg+0xa1/0x280
[ 3291.456493][T11971] ? lock_downgrade+0x690/0x690
[ 3291.461384][T11971] ? lock_downgrade+0x690/0x690
[ 3291.466282][T11971] __memcg_kmem_charge_page+0x16e/0x3c0
[ 3291.471847][T11971] __alloc_pages+0x1f3/0x4a0
[ 3291.476472][T11971] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170
[ 3291.483266][T11971] ? __lock_acquire+0xbc5/0x5d40
[ 3291.488212][T11971] alloc_pages+0x1aa/0x270
[ 3291.492649][T11971] pte_alloc_one+0x1a/0x230
[ 3291.497153][T11971] __handle_mm_fault+0x3c25/0x3e60
[ 3291.502280][T11971] ? vm_iomap_memory+0x190/0x190
[ 3291.507252][T11971] handle_mm_fault+0x2ba/0x9c0
[ 3291.512019][T11971] do_user_addr_fault+0x475/0x1230
[ 3291.517133][T11971] ? rcu_is_watching+0x12/0xb0
[ 3291.521898][T11971] exc_page_fault+0x98/0x170
[ 3291.526487][T11971] asm_exc_page_fault+0x26/0x30
[ 3291.531335][T11971] RIP: 0033:0x7f7b21a3695f
[ 3291.535745][T11971] Code: 24 2c 00 00 00 00 4c 8b 0d 3e 70 17 00 48 8b 94 24 b8 00 00 00 4d 8d 81 00 00 40 00 4c 39 c2 0f 83 64 0f 00 00 48 8b 44 24 58 <48> 8b 32 4c 8d 52 08 4c 89 94 24 b8 00 00 00 48 89 74 24 10 48 83
[ 3291.555367][T11971] RSP: 002b:00007f7b21ccfba0 EFLAGS: 00010287
05:09:12 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c23"], 0xc9)
[ 3291.561428][T11971] RAX: 000000000032320f RBX: 0000000000000000 RCX: 0000000000322fa8
[ 3291.569388][T11971] RDX: 00007f7b21600000 RSI: 00007f7b21ccfb80 RDI: 0000000000000001
[ 3291.577351][T11971] RBP: 0000000000000000 R08: 00007f7b21a00000 R09: 00007f7b21600000
[ 3291.585323][T11971] R10: 00007ffe917a6090 R11: 000000000009b20a R12: 0000000000000001
[ 3291.593304][T11971] R13: 0000000000000000 R14: 0000000000000001 R15: 00007f7b21ccfe40
[ 3291.601285][T11971]
05:09:12 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x0, 0x0, 0x20, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:12 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640), 0x0, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:12 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:12 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x0, 0x0, 0x0, 0x0, 0x21}, {0x200, 0x0, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3293.731601][T11971] memory: usage 307156kB, limit 307200kB, failcnt 7016
[ 3293.798565][T11971] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3293.805482][T11971] Memory cgroup stats for /syz1:
[ 3293.805724][T11971] anon 86016
[ 3293.805724][T11971] file 225280
[ 3293.805724][T11971] kernel 314216448
[ 3293.805724][T11971] kernel_stack 32768
[ 3293.805724][T11971] pagetables 69632
[ 3293.805724][T11971] sec_pagetables 0
[ 3293.805724][T11971] percpu 5434752
[ 3293.805724][T11971] sock 0
[ 3293.805724][T11971] vmalloc 8192
[ 3293.805724][T11971] shmem 225280
[ 3293.805724][T11971] zswap 0
[ 3293.805724][T11971] zswapped 0
[ 3293.805724][T11971] file_mapped 225280
[ 3293.805724][T11971] file_dirty 0
[ 3293.805724][T11971] file_writeback 0
[ 3293.805724][T11971] swapcached 0
[ 3293.805724][T11971] anon_thp 0
[ 3293.805724][T11971] file_thp 0
[ 3293.805724][T11971] shmem_thp 0
[ 3293.805724][T11971] inactive_anon 0
[ 3293.805724][T11971] active_anon 311296
[ 3293.805724][T11971] inactive_file 0
[ 3293.805724][T11971] active_file 0
[ 3293.805724][T11971] unevictable 0
[ 3293.805724][T11971] slab_reclaimable 40280
[ 3293.805724][T11971] slab_unreclaimable 308585848
[ 3293.805724][T11971] slab 308626128
[ 3293.805724][T11971] workingset_refault_anon 0
[ 3293.805724][T11971] workingset_refault_file 0
[ 3293.805724][T11971] workingset_activate_anon 0
[ 3293.805724][T11971] workingset_activate_file 0
[ 3293.805724][T11971] workingset_restore_anon 0
[ 3293.805724][T11971] workingset_restore_file 0
[ 3293.805724][T11971] workingset_nodereclaim 0
[ 3293.805724][T11971] pgscan 0
[ 3293.805724][T11971] pgsteal 0
[ 3293.805724][T11971] pgscan_kswapd 0
[ 3293.805724][T11971] pgscan_direct 0
[ 3293.805724][T11971] pgscan_khugepaged 0
[ 3293.805724][T11971] pgsteal_kswapd 0
[ 3293.805724][T11971] pgsteal_direct 0
[ 3293.805724][T11971] pgsteal_khugepaged 0
[ 3293.805724][T11971] pgfault 647686
[ 3293.805724][T11971] pgmajfault 0
[ 3293.805724][T11971] pgrefill 0
[ 3293.805724][T11971] pgactivate 0
[ 3293.805724][T11971] pgdeactivate 783
[ 3293.805724][T11971] pglazyfree 0
[ 3293.805724][T11971] pglazyfreed 0
[ 3293.805724][T11971] zswpin 0
[ 3293.805724][T11971] zswpout 0
[ 3293.805724][T11971] thp_fault_alloc 0
[ 3294.596014][T11971] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=11971,uid=0
[ 3294.678606][T11971] Memory cgroup out of memory: Killed process 11971 (syz-executor.1) total-vm:54416kB, anon-rss:420kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:76kB oom_score_adj:1000
[ 3294.934103][T12015] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000
[ 3294.955413][T12015] CPU: 1 PID: 12015 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3294.964138][T12015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3294.974184][T12015] Call Trace:
[ 3294.977451][T12015]
[ 3294.980386][T12015] dump_stack_lvl+0x136/0x150
[ 3294.985060][T12015] dump_header+0x10a/0xd70
[ 3294.989474][T12015] oom_kill_process+0x25d/0x600
[ 3294.994326][T12015] out_of_memory+0x35c/0x1660
[ 3294.999000][T12015] ? find_held_lock+0x2d/0x110
[ 3295.003778][T12015] ? oom_killer_disable+0x2b0/0x2b0
[ 3295.008970][T12015] ? rcu_read_unlock+0x9/0x60
[ 3295.013641][T12015] ? find_held_lock+0x2d/0x110
[ 3295.018407][T12015] mem_cgroup_out_of_memory+0x206/0x270
[ 3295.023949][T12015] ? mem_cgroup_margin+0x130/0x130
[ 3295.029077][T12015] ? lock_downgrade+0x690/0x690
[ 3295.033927][T12015] try_charge_memcg+0xf9b/0x13b0
[ 3295.038859][T12015] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3295.044831][T12015] ? get_mem_cgroup_from_objcg+0xa1/0x280
[ 3295.050548][T12015] ? lock_downgrade+0x690/0x690
[ 3295.055393][T12015] ? lock_downgrade+0x690/0x690
[ 3295.060257][T12015] __memcg_kmem_charge_page+0x16e/0x3c0
[ 3295.065811][T12015] memcg_charge_kernel_stack.part.0+0x6c/0x150
[ 3295.071969][T12015] copy_process+0x13a7/0x7590
[ 3295.076652][T12015] ? __lock_acquire+0xbc5/0x5d40
[ 3295.081593][T12015] ? __cleanup_sighand+0xb0/0xb0
[ 3295.086530][T12015] ? lockdep_hardirqs_on_prepare+0x410/0x410
[ 3295.092507][T12015] ? psi_memstall_leave+0x174/0x250
[ 3295.097702][T12015] ? lock_downgrade+0x690/0x690
[ 3295.102551][T12015] kernel_clone+0xeb/0x890
[ 3295.106964][T12015] ? create_io_thread+0xf0/0xf0
[ 3295.111817][T12015] ? percpu_ref_put_many.constprop.0+0x6a/0x1b0
[ 3295.118078][T12015] ? lock_downgrade+0x690/0x690
[ 3295.122928][T12015] __do_sys_clone+0xba/0x100
[ 3295.127516][T12015] ? kernel_clone+0x890/0x890
[ 3295.132196][T12015] ? syscall_enter_from_user_mode+0x26/0x80
[ 3295.138087][T12015] do_syscall_64+0x39/0xb0
[ 3295.142504][T12015] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 3295.148392][T12015] RIP: 0033:0x7f7b21a8d591
[ 3295.152797][T12015] Code: 48 85 ff 74 3d 48 85 f6 74 38 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 7c 13 74 01 c3 31 ed 58 5f ff d0 48 89 c7 b8 3c 00 00 00
[ 3295.172393][T12015] RSP: 002b:00007f7b21ccfa68 EFLAGS: 00000206 ORIG_RAX: 0000000000000038
[ 3295.180815][T12015] RAX: ffffffffffffffda RBX: 00007f7b2276c700 RCX: 00007f7b21a8d591
[ 3295.188779][T12015] RDX: 00007f7b2276c9d0 RSI: 00007f7b2276c2f0 RDI: 00000000003d0f00
[ 3295.196738][T12015] RBP: 00007f7b21ccfcb0 R08: 00007f7b2276c700 R09: 00007f7b2276c700
[ 3295.204715][T12015] R10: 00007f7b2276c9d0 R11: 0000000000000206 R12: 00007f7b21ccfb1e
[ 3295.212694][T12015] R13: 00007f7b21ccfb1f R14: 00007f7b2276c300 R15: 0000000000022000
[ 3295.220663][T12015]
[ 3295.293295][ C1] net_ratelimit: 2660 callbacks suppressed
[ 3295.293315][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3295.311722][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3295.323869][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies.
[ 3295.333529][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies.
[ 3295.343213][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3295.355675][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3295.367977][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3295.380454][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3295.392553][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3295.405017][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
05:09:15 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0x14c)
05:09:15 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640), 0x0, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:15 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x0, 0x0, 0x0, 0x0, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:15 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:15 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c23"], 0xc9)
05:09:15 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x0, 0x0, 0x0, 0x0, 0x21}, {0x200, 0x0, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3295.492389][T12015] memory: usage 307200kB, limit 307200kB, failcnt 7095
[ 3295.508431][T12015] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3295.541445][T12015] Memory cgroup stats for /syz1:
[ 3295.541690][T12015] anon 98304
[ 3295.541690][T12015] file 225280
[ 3295.541690][T12015] kernel 314249216
[ 3295.541690][T12015] kernel_stack 32768
[ 3295.541690][T12015] pagetables 73728
[ 3295.541690][T12015] sec_pagetables 0
[ 3295.541690][T12015] percpu 5434752
[ 3295.541690][T12015] sock 0
[ 3295.541690][T12015] vmalloc 8192
[ 3295.541690][T12015] shmem 225280
[ 3295.541690][T12015] zswap 0
[ 3295.541690][T12015] zswapped 0
[ 3295.541690][T12015] file_mapped 225280
[ 3295.541690][T12015] file_dirty 0
[ 3295.541690][T12015] file_writeback 0
[ 3295.541690][T12015] swapcached 0
[ 3295.541690][T12015] anon_thp 0
[ 3295.541690][T12015] file_thp 0
[ 3295.541690][T12015] shmem_thp 0
[ 3295.541690][T12015] inactive_anon 0
[ 3295.541690][T12015] active_anon 323584
[ 3295.541690][T12015] inactive_file 0
[ 3295.541690][T12015] active_file 0
[ 3295.541690][T12015] unevictable 0
[ 3295.541690][T12015] slab_reclaimable 40664
[ 3295.541690][T12015] slab_unreclaimable 308594856
[ 3295.541690][T12015] slab 308635520
[ 3295.541690][T12015] workingset_refault_anon 0
[ 3295.541690][T12015] workingset_refault_file 0
[ 3295.541690][T12015] workingset_activate_anon 0
[ 3295.541690][T12015] workingset_activate_file 0
[ 3295.541690][T12015] workingset_restore_anon 0
[ 3295.541690][T12015] workingset_restore_file 0
[ 3295.541690][T12015] workingset_nodereclaim 0
[ 3295.541690][T12015] pgscan 0
[ 3295.541690][T12015] pgsteal 0
[ 3295.541690][T12015] pgscan_kswapd 0
[ 3295.541690][T12015] pgscan_direct 0
[ 3295.541690][T12015] pgscan_khugepaged 0
[ 3295.541690][T12015] pgsteal_kswapd 0
[ 3295.541690][T12015] pgsteal_direct 0
[ 3295.541690][T12015] pgsteal_khugepaged 0
[ 3295.541690][T12015] pgfault 647724
[ 3295.541690][T12015] pgmajfault 0
[ 3295.541690][T12015] pgrefill 0
[ 3295.541690][T12015] pgactivate 0
[ 3295.541690][T12015] pgdeactivate 783
[ 3295.541690][T12015] pglazyfree 0
[ 3295.541690][T12015] pglazyfreed 0
[ 3295.541690][T12015] zswpin 0
[ 3295.541690][T12015] zswpout 0
[ 3295.541690][T12015] thp_fault_alloc 0
05:09:16 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{0x0}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:16 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c23"], 0xc9)
05:09:16 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c23"], 0xc9)
05:09:16 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{0x0}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:16 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
getpid()
process_vm_readv(0x0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, r0, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:16 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{0x0}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3296.783194][T12015] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=12015,uid=0
[ 3296.866752][T12015] Memory cgroup out of memory: Killed process 12015 (syz-executor.1) total-vm:54548kB, anon-rss:384kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000
05:09:17 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0x15e)
05:09:17 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x0, 0x0, 0x0, 0x0, 0x21}, {0x200, 0x0, 0x0, 0x7, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:17 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
getpid()
process_vm_readv(0x0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, r0, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:17 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c23"], 0xc9)
05:09:17 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(0x0, 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:17 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
getpid()
process_vm_readv(0x0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, r0, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:17 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360"], 0xc9)
[ 3297.385856][T12067] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000
[ 3297.471010][T12067] CPU: 1 PID: 12067 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3297.479758][T12067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3297.489834][T12067] Call Trace:
[ 3297.493128][T12067]
[ 3297.496063][T12067] dump_stack_lvl+0x136/0x150
[ 3297.500737][T12067] dump_header+0x10a/0xd70
[ 3297.505152][T12067] oom_kill_process+0x25d/0x600
[ 3297.510030][T12067] out_of_memory+0x35c/0x1660
[ 3297.514712][T12067] ? find_held_lock+0x2d/0x110
[ 3297.519485][T12067] ? oom_killer_disable+0x2b0/0x2b0
[ 3297.524683][T12067] ? rcu_read_unlock+0x9/0x60
[ 3297.529361][T12067] ? find_held_lock+0x2d/0x110
[ 3297.534130][T12067] mem_cgroup_out_of_memory+0x206/0x270
[ 3297.539680][T12067] ? mem_cgroup_margin+0x130/0x130
[ 3297.544793][T12067] ? lock_downgrade+0x690/0x690
[ 3297.549647][T12067] try_charge_memcg+0xf9b/0x13b0
[ 3297.554581][T12067] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3297.560576][T12067] ? get_mem_cgroup_from_objcg+0xa1/0x280
[ 3297.566298][T12067] ? lock_downgrade+0x690/0x690
[ 3297.571159][T12067] ? lock_downgrade+0x690/0x690
[ 3297.576013][T12067] __memcg_kmem_charge_page+0x16e/0x3c0
[ 3297.581567][T12067] memcg_charge_kernel_stack.part.0+0x6c/0x150
[ 3297.587736][T12067] copy_process+0x4e3/0x7590
[ 3297.592335][T12067] ? __lock_acquire+0xbc5/0x5d40
[ 3297.597288][T12067] ? __cleanup_sighand+0xb0/0xb0
[ 3297.602225][T12067] ? lockdep_hardirqs_on_prepare+0x410/0x410
[ 3297.608223][T12067] ? psi_memstall_leave+0x174/0x250
[ 3297.613421][T12067] ? lock_downgrade+0x690/0x690
[ 3297.618269][T12067] kernel_clone+0xeb/0x890
[ 3297.622683][T12067] ? create_io_thread+0xf0/0xf0
[ 3297.627529][T12067] ? percpu_ref_put_many.constprop.0+0x6a/0x1b0
[ 3297.633786][T12067] ? lock_downgrade+0x690/0x690
[ 3297.638637][T12067] __do_sys_clone+0xba/0x100
[ 3297.643223][T12067] ? kernel_clone+0x890/0x890
[ 3297.647921][T12067] ? syscall_enter_from_user_mode+0x26/0x80
[ 3297.653813][T12067] do_syscall_64+0x39/0xb0
[ 3297.658231][T12067] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 3297.664121][T12067] RIP: 0033:0x7f7b21a8d591
[ 3297.668536][T12067] Code: 48 85 ff 74 3d 48 85 f6 74 38 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 7c 13 74 01 c3 31 ed 58 5f ff d0 48 89 c7 b8 3c 00 00 00
[ 3297.688165][T12067] RSP: 002b:00007f7b21ccfa68 EFLAGS: 00000206 ORIG_RAX: 0000000000000038
[ 3297.696567][T12067] RAX: ffffffffffffffda RBX: 00007f7b2276c700 RCX: 00007f7b21a8d591
[ 3297.704530][T12067] RDX: 00007f7b2276c9d0 RSI: 00007f7b2276c2f0 RDI: 00000000003d0f00
[ 3297.712509][T12067] RBP: 00007f7b21ccfcb0 R08: 00007f7b2276c700 R09: 00007f7b2276c700
[ 3297.720468][T12067] R10: 00007f7b2276c9d0 R11: 0000000000000206 R12: 00007f7b21ccfb1e
[ 3297.728431][T12067] R13: 00007f7b21ccfb1f R14: 00007f7b2276c300 R15: 0000000000022000
[ 3297.736402][T12067]
05:09:18 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c23"], 0xc9)
05:09:18 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, 0x0, 0x0, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:18 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(0x0, 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:18 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x0, 0x0, 0x0, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x0, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:18 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, 0x0, 0x0, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3299.102425][T12067] memory: usage 307200kB, limit 307200kB, failcnt 7177
[ 3299.109617][T12067] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3299.124673][T12067] Memory cgroup stats for /syz1:
[ 3299.124919][T12067] anon 98304
[ 3299.124919][T12067] file 225280
[ 3299.124919][T12067] kernel 314249216
[ 3299.124919][T12067] kernel_stack 32768
[ 3299.124919][T12067] pagetables 73728
[ 3299.124919][T12067] sec_pagetables 0
[ 3299.124919][T12067] percpu 5434752
[ 3299.124919][T12067] sock 0
[ 3299.124919][T12067] vmalloc 8192
[ 3299.124919][T12067] shmem 225280
[ 3299.124919][T12067] zswap 0
[ 3299.124919][T12067] zswapped 0
[ 3299.124919][T12067] file_mapped 225280
[ 3299.124919][T12067] file_dirty 0
[ 3299.124919][T12067] file_writeback 0
[ 3299.124919][T12067] swapcached 0
[ 3299.124919][T12067] anon_thp 0
[ 3299.124919][T12067] file_thp 0
[ 3299.124919][T12067] shmem_thp 0
[ 3299.124919][T12067] inactive_anon 0
[ 3299.124919][T12067] active_anon 323584
[ 3299.124919][T12067] inactive_file 0
[ 3299.124919][T12067] active_file 0
[ 3299.124919][T12067] unevictable 0
[ 3299.124919][T12067] slab_reclaimable 40664
[ 3299.124919][T12067] slab_unreclaimable 308602376
[ 3299.124919][T12067] slab 308643040
[ 3299.124919][T12067] workingset_refault_anon 0
[ 3299.124919][T12067] workingset_refault_file 0
[ 3299.124919][T12067] workingset_activate_anon 0
[ 3299.124919][T12067] workingset_activate_file 0
[ 3299.124919][T12067] workingset_restore_anon 0
[ 3299.124919][T12067] workingset_restore_file 0
[ 3299.124919][T12067] workingset_nodereclaim 0
[ 3299.124919][T12067] pgscan 0
[ 3299.124919][T12067] pgsteal 0
[ 3299.124919][T12067] pgscan_kswapd 0
[ 3299.124919][T12067] pgscan_direct 0
[ 3299.124919][T12067] pgscan_khugepaged 0
[ 3299.124919][T12067] pgsteal_kswapd 0
[ 3299.124919][T12067] pgsteal_direct 0
[ 3299.124919][T12067] pgsteal_khugepaged 0
[ 3299.124919][T12067] pgfault 647762
[ 3299.124919][T12067] pgmajfault 0
[ 3299.124919][T12067] pgrefill 0
[ 3299.124919][T12067] pgactivate 0
[ 3299.124919][T12067] pgdeactivate 783
[ 3299.124919][T12067] pglazyfree 0
[ 3299.124919][T12067] pglazyfreed 0
[ 3299.124919][T12067] zswpin 0
[ 3299.124919][T12067] zswpout 0
[ 3299.124919][T12067] thp_fault_alloc 0
[ 3299.558662][T12067] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=12067,uid=0
[ 3299.655940][T12067] Memory cgroup out of memory: Killed process 12067 (syz-executor.1) total-vm:54548kB, anon-rss:384kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000
05:09:20 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0x198)
05:09:20 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
getpid()
process_vm_readv(0x0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, r0, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:20 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360"], 0xc9)
05:09:20 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, 0x0, 0x0, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:20 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(0x0, 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:20 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x0, 0x0, 0x0, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x0, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:20 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
getpid()
process_vm_readv(0x0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, r0, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3299.952555][T12103] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000
[ 3299.963982][T12103] CPU: 1 PID: 12103 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3299.972696][T12103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3299.982770][T12103] Call Trace:
[ 3299.986063][T12103]
[ 3299.989010][T12103] dump_stack_lvl+0x136/0x150
[ 3299.993743][T12103] dump_header+0x10a/0xd70
[ 3299.998200][T12103] oom_kill_process+0x25d/0x600
[ 3300.003089][T12103] out_of_memory+0x35c/0x1660
[ 3300.007804][T12103] ? find_held_lock+0x2d/0x110
[ 3300.012609][T12103] ? oom_killer_disable+0x2b0/0x2b0
[ 3300.017836][T12103] ? rcu_read_unlock+0x9/0x60
[ 3300.022544][T12103] ? find_held_lock+0x2d/0x110
[ 3300.027351][T12103] mem_cgroup_out_of_memory+0x206/0x270
[ 3300.032939][T12103] ? mem_cgroup_margin+0x130/0x130
[ 3300.038082][T12103] ? lock_downgrade+0x690/0x690
[ 3300.042992][T12103] try_charge_memcg+0xf9b/0x13b0
[ 3300.047967][T12103] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3300.053981][T12103] ? get_mem_cgroup_from_objcg+0xa1/0x280
[ 3300.059744][T12103] ? lock_downgrade+0x690/0x690
[ 3300.064626][T12103] ? lock_downgrade+0x690/0x690
[ 3300.069523][T12103] __memcg_kmem_charge_page+0x16e/0x3c0
[ 3300.075105][T12103] memcg_charge_kernel_stack.part.0+0x6c/0x150
[ 3300.081293][T12103] copy_process+0x4e3/0x7590
[ 3300.085918][T12103] ? __lock_acquire+0xbc5/0x5d40
[ 3300.090896][T12103] ? __cleanup_sighand+0xb0/0xb0
[ 3300.095864][T12103] ? lockdep_hardirqs_on_prepare+0x410/0x410
[ 3300.101877][T12103] ? psi_memstall_leave+0x174/0x250
[ 3300.107109][T12103] ? lock_downgrade+0x690/0x690
[ 3300.111997][T12103] kernel_clone+0xeb/0x890
[ 3300.116443][T12103] ? create_io_thread+0xf0/0xf0
[ 3300.121337][T12103] ? percpu_ref_put_many.constprop.0+0x6a/0x1b0
[ 3300.127618][T12103] ? lock_downgrade+0x690/0x690
[ 3300.132509][T12103] __do_sys_clone+0xba/0x100
[ 3300.137125][T12103] ? kernel_clone+0x890/0x890
[ 3300.141811][T12103] ? syscall_enter_from_user_mode+0x26/0x80
[ 3300.147709][T12103] do_syscall_64+0x39/0xb0
[ 3300.152128][T12103] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 3300.158018][T12103] RIP: 0033:0x7f7b21a8d591
[ 3300.162425][T12103] Code: 48 85 ff 74 3d 48 85 f6 74 38 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 7c 13 74 01 c3 31 ed 58 5f ff d0 48 89 c7 b8 3c 00 00 00
[ 3300.182040][T12103] RSP: 002b:00007f7b21ccfa68 EFLAGS: 00000206 ORIG_RAX: 0000000000000038
[ 3300.190446][T12103] RAX: ffffffffffffffda RBX: 00007f7b2276c700 RCX: 00007f7b21a8d591
[ 3300.198408][T12103] RDX: 00007f7b2276c9d0 RSI: 00007f7b2276c2f0 RDI: 00000000003d0f00
[ 3300.206368][T12103] RBP: 00007f7b21ccfcb0 R08: 00007f7b2276c700 R09: 00007f7b2276c700
[ 3300.214328][T12103] R10: 00007f7b2276c9d0 R11: 0000000000000206 R12: 00007f7b21ccfb1e
[ 3300.222306][T12103] R13: 00007f7b21ccfb1f R14: 00007f7b2276c300 R15: 0000000000022000
[ 3300.230279][T12103]
05:09:20 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
getpid()
process_vm_readv(0x0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r2, r0, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3300.410687][ C0] net_ratelimit: 2094 callbacks suppressed
[ 3300.410700][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3300.428866][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3300.441033][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3300.453262][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3300.465599][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies.
[ 3300.475631][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3300.487935][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
05:09:20 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}], 0x1, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3300.500109][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3300.512344][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3300.525389][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
05:09:21 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(0x0, 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:21 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:21 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360"], 0xc9)
[ 3301.482272][T12103] memory: usage 307200kB, limit 307200kB, failcnt 7251
[ 3301.544927][T12103] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3301.659512][T12103] Memory cgroup stats for /syz1:
[ 3301.659764][T12103] anon 98304
[ 3301.659764][T12103] file 225280
[ 3301.659764][T12103] kernel 314249216
[ 3301.659764][T12103] kernel_stack 32768
[ 3301.659764][T12103] pagetables 73728
[ 3301.659764][T12103] sec_pagetables 0
[ 3301.659764][T12103] percpu 5434752
[ 3301.659764][T12103] sock 0
[ 3301.659764][T12103] vmalloc 8192
[ 3301.659764][T12103] shmem 225280
[ 3301.659764][T12103] zswap 0
[ 3301.659764][T12103] zswapped 0
[ 3301.659764][T12103] file_mapped 225280
[ 3301.659764][T12103] file_dirty 0
[ 3301.659764][T12103] file_writeback 0
[ 3301.659764][T12103] swapcached 0
[ 3301.659764][T12103] anon_thp 0
[ 3301.659764][T12103] file_thp 0
[ 3301.659764][T12103] shmem_thp 0
[ 3301.659764][T12103] inactive_anon 0
[ 3301.659764][T12103] active_anon 323584
[ 3301.659764][T12103] inactive_file 0
[ 3301.659764][T12103] active_file 0
[ 3301.659764][T12103] unevictable 0
[ 3301.659764][T12103] slab_reclaimable 40280
[ 3301.659764][T12103] slab_unreclaimable 308609552
[ 3301.659764][T12103] slab 308649832
[ 3301.659764][T12103] workingset_refault_anon 0
[ 3301.659764][T12103] workingset_refault_file 0
[ 3301.659764][T12103] workingset_activate_anon 0
[ 3301.659764][T12103] workingset_activate_file 0
[ 3301.659764][T12103] workingset_restore_anon 0
[ 3301.659764][T12103] workingset_restore_file 0
[ 3301.659764][T12103] workingset_nodereclaim 0
[ 3301.659764][T12103] pgscan 0
[ 3301.659764][T12103] pgsteal 0
[ 3301.659764][T12103] pgscan_kswapd 0
[ 3301.659764][T12103] pgscan_direct 0
[ 3301.659764][T12103] pgscan_khugepaged 0
[ 3301.659764][T12103] pgsteal_kswapd 0
[ 3301.659764][T12103] pgsteal_direct 0
[ 3301.659764][T12103] pgsteal_khugepaged 0
[ 3301.659764][T12103] pgfault 647800
[ 3301.659764][T12103] pgmajfault 0
[ 3301.659764][T12103] pgrefill 0
[ 3301.659764][T12103] pgactivate 0
[ 3301.659764][T12103] pgdeactivate 783
[ 3301.659764][T12103] pglazyfree 0
[ 3301.659764][T12103] pglazyfreed 0
[ 3301.659764][T12103] zswpin 0
[ 3301.659764][T12103] zswpout 0
[ 3301.659764][T12103] thp_fault_alloc 0
[ 3301.885642][T12103] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=12103,uid=0
[ 3301.933132][T12103] Memory cgroup out of memory: Killed process 12103 (syz-executor.1) total-vm:54548kB, anon-rss:384kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000
05:09:22 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0x1fc)
05:09:22 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x0, 0x0, 0x0, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x0, 0xad, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:22 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}], 0x1, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:22 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34b"], 0xc9)
05:09:22 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}], 0x1, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3302.393584][T12140] syz-executor.1 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000
05:09:22 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3302.621100][T12140] CPU: 0 PID: 12140 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3302.629850][T12140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3302.639933][T12140] Call Trace:
[ 3302.643236][T12140]
[ 3302.646187][T12140] dump_stack_lvl+0x136/0x150
[ 3302.650899][T12140] dump_header+0x10a/0xd70
[ 3302.655361][T12140] oom_kill_process+0x25d/0x600
[ 3302.660298][T12140] out_of_memory+0x35c/0x1660
[ 3302.665022][T12140] ? find_held_lock+0x2d/0x110
[ 3302.669834][T12140] ? oom_killer_disable+0x2b0/0x2b0
[ 3302.675070][T12140] ? rcu_read_unlock+0x9/0x60
[ 3302.679772][T12140] ? find_held_lock+0x2d/0x110
[ 3302.684543][T12140] mem_cgroup_out_of_memory+0x206/0x270
[ 3302.690108][T12140] ? mem_cgroup_margin+0x130/0x130
[ 3302.695215][T12140] ? lock_downgrade+0x690/0x690
[ 3302.700067][T12140] try_charge_memcg+0xf9b/0x13b0
[ 3302.704998][T12140] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3302.710972][T12140] ? get_mem_cgroup_from_objcg+0xa1/0x280
[ 3302.716692][T12140] ? lock_downgrade+0x690/0x690
[ 3302.721536][T12140] ? lock_downgrade+0x690/0x690
[ 3302.726386][T12140] __memcg_kmem_charge_page+0x16e/0x3c0
[ 3302.731939][T12140] __alloc_pages+0x1f3/0x4a0
[ 3302.736524][T12140] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170
[ 3302.743277][T12140] ? find_held_lock+0x2d/0x110
[ 3302.748044][T12140] ? lock_downgrade+0x690/0x690
[ 3302.752903][T12140] ? do_raw_spin_lock+0x124/0x2b0
[ 3302.757925][T12140] alloc_pages+0x1aa/0x270
[ 3302.762360][T12140] __pmd_alloc+0x3f/0x5d0
[ 3302.766680][T12140] ? __pud_alloc+0xe4/0x180
[ 3302.771178][T12140] __handle_mm_fault+0x932/0x3e60
[ 3302.776216][T12140] ? vm_iomap_memory+0x190/0x190
[ 3302.781160][T12140] handle_mm_fault+0x2ba/0x9c0
[ 3302.785924][T12140] do_user_addr_fault+0x475/0x1230
[ 3302.791049][T12140] ? rcu_is_watching+0x12/0xb0
[ 3302.795812][T12140] exc_page_fault+0x98/0x170
[ 3302.800396][T12140] asm_exc_page_fault+0x26/0x30
[ 3302.805241][T12140] RIP: 0033:0x7f7b21a27766
[ 3302.809650][T12140] Code: ff ff 66 90 48 8b 0d 89 df ca 00 4c 63 05 72 df ca 00 48 8b 05 73 df ca 00 49 01 c8 48 39 c8 72 13 4c 39 c0 73 0e 48 8d 50 04 <89> 38 48 89 15 59 df ca 00 c3 52 48 8d 35 e2 f1 0b 00 48 89 c2 48
[ 3302.829249][T12140] RSP: 002b:00007f7b21ccfb98 EFLAGS: 00010287
[ 3302.835322][T12140] RAX: 0000001b32920000 RBX: 0000000000000003 RCX: 0000001b32920000
[ 3302.843283][T12140] RDX: 0000001b32920004 RSI: 00000000003c0000 RDI: 0000000000000000
[ 3302.851242][T12140] RBP: 0000000000000000 R08: 0000001b32d20000 R09: 0000000000040000
[ 3302.859203][T12140] R10: 0000000000000011 R11: 0000000000000000 R12: 0000000000000001
05:09:23 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {0x0}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:23 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3302.867266][T12140] R13: 0000000000000000 R14: 0000000000000001 R15: 00007f7b21ccfe40
[ 3302.875272][T12140]
05:09:23 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {0x0}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:23 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x0, 0x0, 0x0, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:23 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34b"], 0xc9)
05:09:23 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {0x0}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3304.214207][T12140] memory: usage 307192kB, limit 307200kB, failcnt 7335
[ 3304.229057][T12140] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3304.288823][T12140] Memory cgroup stats for /syz1:
[ 3304.289241][T12140] anon 86016
[ 3304.289241][T12140] file 225280
[ 3304.289241][T12140] kernel 314253312
[ 3304.289241][T12140] kernel_stack 32768
[ 3304.289241][T12140] pagetables 61440
[ 3304.289241][T12140] sec_pagetables 0
[ 3304.289241][T12140] percpu 5434816
[ 3304.289241][T12140] sock 0
[ 3304.289241][T12140] vmalloc 8192
[ 3304.289241][T12140] shmem 225280
[ 3304.289241][T12140] zswap 0
[ 3304.289241][T12140] zswapped 0
[ 3304.289241][T12140] file_mapped 225280
[ 3304.289241][T12140] file_dirty 0
[ 3304.289241][T12140] file_writeback 0
[ 3304.289241][T12140] swapcached 0
[ 3304.289241][T12140] anon_thp 0
[ 3304.289241][T12140] file_thp 0
[ 3304.289241][T12140] shmem_thp 0
[ 3304.289241][T12140] inactive_anon 0
[ 3304.289241][T12140] active_anon 311296
[ 3304.289241][T12140] inactive_file 0
[ 3304.289241][T12140] active_file 0
[ 3304.289241][T12140] unevictable 0
[ 3304.289241][T12140] slab_reclaimable 52280
[ 3304.289241][T12140] slab_unreclaimable 308617272
[ 3304.289241][T12140] slab 308669552
[ 3304.289241][T12140] workingset_refault_anon 0
[ 3304.289241][T12140] workingset_refault_file 0
[ 3304.289241][T12140] workingset_activate_anon 0
[ 3304.289241][T12140] workingset_activate_file 0
[ 3304.289241][T12140] workingset_restore_anon 0
[ 3304.289241][T12140] workingset_restore_file 0
[ 3304.289241][T12140] workingset_nodereclaim 0
[ 3304.289241][T12140] pgscan 0
[ 3304.289241][T12140] pgsteal 0
[ 3304.289241][T12140] pgscan_kswapd 0
[ 3304.289241][T12140] pgscan_direct 0
[ 3304.289241][T12140] pgscan_khugepaged 0
[ 3304.289241][T12140] pgsteal_kswapd 0
[ 3304.289241][T12140] pgsteal_direct 0
[ 3304.289241][T12140] pgsteal_khugepaged 0
[ 3304.289241][T12140] pgfault 647832
[ 3304.289241][T12140] pgmajfault 0
[ 3304.289241][T12140] pgrefill 0
[ 3304.289241][T12140] pgactivate 0
[ 3304.289241][T12140] pgdeactivate 783
[ 3304.289241][T12140] pglazyfree 0
[ 3304.289241][T12140] pglazyfreed 0
[ 3304.289241][T12140] zswpin 0
[ 3304.289241][T12140] zswpout 0
[ 3304.289241][T12140] thp_fault_alloc 0
[ 3304.808496][T12140] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=12140,uid=0
[ 3304.838601][T12140] Memory cgroup out of memory: Killed process 12140 (syz-executor.1) total-vm:54416kB, anon-rss:384kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:68kB oom_score_adj:1000
05:09:25 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0x2c2)
05:09:25 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:25 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000006180)=""/152, 0x98}], 0x1, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:25 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:25 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34b"], 0xc9)
05:09:25 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x0, 0x0, 0x0, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:25 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000006180)=""/152, 0x98}], 0x1, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3305.402256][T12182] syz-executor.1 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000
[ 3305.452493][ C0] net_ratelimit: 2338 callbacks suppressed
[ 3305.452506][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3305.470638][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3305.482812][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3305.495403][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3305.507628][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies.
[ 3305.517646][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3305.529885][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3305.542064][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3305.554627][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3305.566949][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3305.628809][T12182] CPU: 1 PID: 12182 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3305.637523][T12182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3305.647586][T12182] Call Trace:
[ 3305.650857][T12182]
[ 3305.653781][T12182] dump_stack_lvl+0x136/0x150
[ 3305.658458][T12182] dump_header+0x10a/0xd70
[ 3305.662874][T12182] oom_kill_process+0x25d/0x600
[ 3305.667721][T12182] out_of_memory+0x35c/0x1660
[ 3305.672394][T12182] ? find_held_lock+0x2d/0x110
[ 3305.677159][T12182] ? oom_killer_disable+0x2b0/0x2b0
[ 3305.682356][T12182] ? rcu_read_unlock+0x9/0x60
[ 3305.687041][T12182] ? find_held_lock+0x2d/0x110
[ 3305.691805][T12182] mem_cgroup_out_of_memory+0x206/0x270
[ 3305.697348][T12182] ? mem_cgroup_margin+0x130/0x130
[ 3305.702454][T12182] ? lock_downgrade+0x690/0x690
[ 3305.707309][T12182] try_charge_memcg+0xf9b/0x13b0
[ 3305.712242][T12182] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3305.718211][T12182] ? get_mem_cgroup_from_objcg+0xa1/0x280
[ 3305.723928][T12182] ? lock_downgrade+0x690/0x690
[ 3305.728772][T12182] ? lock_downgrade+0x690/0x690
[ 3305.733621][T12182] __memcg_kmem_charge_page+0x16e/0x3c0
[ 3305.739161][T12182] __alloc_pages+0x1f3/0x4a0
[ 3305.743763][T12182] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170
[ 3305.750518][T12182] ? __lock_acquire+0xbc5/0x5d40
[ 3305.755458][T12182] alloc_pages+0x1aa/0x270
[ 3305.759878][T12182] pte_alloc_one+0x1a/0x230
[ 3305.764378][T12182] __handle_mm_fault+0x3c25/0x3e60
[ 3305.769490][T12182] ? vm_iomap_memory+0x190/0x190
[ 3305.774433][T12182] handle_mm_fault+0x2ba/0x9c0
[ 3305.779194][T12182] do_user_addr_fault+0x475/0x1230
[ 3305.784302][T12182] ? rcu_is_watching+0x12/0xb0
[ 3305.789063][T12182] exc_page_fault+0x98/0x170
[ 3305.793648][T12182] asm_exc_page_fault+0x26/0x30
[ 3305.798499][T12182] RIP: 0033:0x7f7b21a3695f
[ 3305.802922][T12182] Code: 24 2c 00 00 00 00 4c 8b 0d 3e 70 17 00 48 8b 94 24 b8 00 00 00 4d 8d 81 00 00 40 00 4c 39 c2 0f 83 64 0f 00 00 48 8b 44 24 58 <48> 8b 32 4c 8d 52 08 4c 89 94 24 b8 00 00 00 48 89 74 24 10 48 83
[ 3305.822519][T12182] RSP: 002b:00007f7b21ccfba0 EFLAGS: 00010287
05:09:26 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000006180)=""/152, 0x98}], 0x1, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3305.828576][T12182] RAX: 0000000000326949 RBX: 0000000000000000 RCX: 0000000000326658
[ 3305.836538][T12182] RDX: 00007f7b21600000 RSI: 00007f7b21ccfb80 RDI: 0000000000000001
[ 3305.844513][T12182] RBP: 0000000000000000 R08: 00007f7b21a00000 R09: 00007f7b21600000
[ 3305.852475][T12182] R10: 00007ffe917a6090 R11: 000000000009bbc6 R12: 0000000000000001
[ 3305.860435][T12182] R13: 0000000000000000 R14: 0000000000000001 R15: 00007f7b21ccfe40
[ 3305.868405][T12182]
05:09:26 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, 0x0, 0x0)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:26 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6"], 0xc9)
[ 3306.058613][T12182] memory: usage 307200kB, limit 307200kB, failcnt 7402
[ 3306.089790][T12182] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3306.124776][T12182] Memory cgroup stats for /syz1:
[ 3306.125063][T12182] anon 86016
[ 3306.125063][T12182] file 225280
[ 3306.125063][T12182] kernel 314261504
[ 3306.125063][T12182] kernel_stack 32768
[ 3306.125063][T12182] pagetables 69632
[ 3306.125063][T12182] sec_pagetables 0
[ 3306.125063][T12182] percpu 5434816
[ 3306.125063][T12182] sock 0
[ 3306.125063][T12182] vmalloc 8192
[ 3306.125063][T12182] shmem 225280
[ 3306.125063][T12182] zswap 0
[ 3306.125063][T12182] zswapped 0
[ 3306.125063][T12182] file_mapped 225280
[ 3306.125063][T12182] file_dirty 0
[ 3306.125063][T12182] file_writeback 0
[ 3306.125063][T12182] swapcached 0
[ 3306.125063][T12182] anon_thp 0
[ 3306.125063][T12182] file_thp 0
[ 3306.125063][T12182] shmem_thp 0
[ 3306.125063][T12182] inactive_anon 0
[ 3306.125063][T12182] active_anon 311296
[ 3306.125063][T12182] inactive_file 0
[ 3306.125063][T12182] active_file 0
[ 3306.125063][T12182] unevictable 0
[ 3306.125063][T12182] slab_reclaimable 52280
[ 3306.125063][T12182] slab_unreclaimable 308617920
[ 3306.125063][T12182] slab 308670200
[ 3306.125063][T12182] workingset_refault_anon 0
[ 3306.125063][T12182] workingset_refault_file 0
[ 3306.125063][T12182] workingset_activate_anon 0
[ 3306.125063][T12182] workingset_activate_file 0
[ 3306.125063][T12182] workingset_restore_anon 0
[ 3306.125063][T12182] workingset_restore_file 0
[ 3306.125063][T12182] workingset_nodereclaim 0
[ 3306.125063][T12182] pgscan 0
[ 3306.125063][T12182] pgsteal 0
[ 3306.125063][T12182] pgscan_kswapd 0
[ 3306.125063][T12182] pgscan_direct 0
[ 3306.125063][T12182] pgscan_khugepaged 0
[ 3306.125063][T12182] pgsteal_kswapd 0
[ 3306.125063][T12182] pgsteal_direct 0
05:09:26 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3306.125063][T12182] pgsteal_khugepaged 0
[ 3306.125063][T12182] pgfault 647866
[ 3306.125063][T12182] pgmajfault 0
[ 3306.125063][T12182] pgrefill 0
[ 3306.125063][T12182] pgactivate 0
[ 3306.125063][T12182] pgdeactivate 783
[ 3306.125063][T12182] pglazyfree 0
[ 3306.125063][T12182] pglazyfreed 0
[ 3306.125063][T12182] zswpin 0
[ 3306.125063][T12182] zswpout 0
[ 3306.125063][T12182] thp_fault_alloc 0
05:09:26 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x0, 0x0, 0x0, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3307.385820][T12182] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=12182,uid=0
[ 3307.524428][T12182] Memory cgroup out of memory: Killed process 12182 (syz-executor.1) total-vm:54416kB, anon-rss:384kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:76kB oom_score_adj:1000
05:09:28 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0x2d0)
05:09:28 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{0x0}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:28 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x0, 0x0, 0x0, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:28 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x0, 0x0, 0x0, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x0, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:28 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, 0x0, 0x0)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:28 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6"], 0xc9)
05:09:28 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{0x0}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3307.834875][T12222] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000
[ 3307.855755][T12222] CPU: 1 PID: 12222 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3307.864452][T12222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3307.874529][T12222] Call Trace:
[ 3307.877824][T12222]
[ 3307.880777][T12222] dump_stack_lvl+0x136/0x150
[ 3307.885487][T12222] dump_header+0x10a/0xd70
[ 3307.889950][T12222] oom_kill_process+0x25d/0x600
[ 3307.894840][T12222] out_of_memory+0x35c/0x1660
[ 3307.899560][T12222] ? find_held_lock+0x2d/0x110
[ 3307.904369][T12222] ? oom_killer_disable+0x2b0/0x2b0
[ 3307.909601][T12222] ? rcu_read_unlock+0x9/0x60
[ 3307.914309][T12222] ? find_held_lock+0x2d/0x110
[ 3307.919121][T12222] mem_cgroup_out_of_memory+0x206/0x270
[ 3307.924696][T12222] ? mem_cgroup_margin+0x130/0x130
[ 3307.929801][T12222] ? lock_downgrade+0x690/0x690
[ 3307.934651][T12222] try_charge_memcg+0xf9b/0x13b0
[ 3307.939581][T12222] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3307.945550][T12222] ? get_mem_cgroup_from_objcg+0xa1/0x280
[ 3307.951266][T12222] ? lock_downgrade+0x690/0x690
[ 3307.956112][T12222] ? lock_downgrade+0x690/0x690
[ 3307.960960][T12222] obj_cgroup_charge+0x2af/0x5e0
[ 3307.965901][T12222] ? vm_area_alloc+0x20/0x100
[ 3307.970577][T12222] kmem_cache_alloc+0xb1/0x3b0
[ 3307.975338][T12222] ? mas_prev+0x168/0x720
[ 3307.979664][T12222] vm_area_alloc+0x20/0x100
[ 3307.984160][T12222] mmap_region+0x403/0x2620
[ 3307.988665][T12222] ? do_munmap+0xf0/0xf0
[ 3307.992913][T12222] ? security_mmap_addr+0x77/0xa0
[ 3307.998377][T12222] ? get_unmapped_area+0x1e8/0x3c0
[ 3308.003508][T12222] do_mmap+0x831/0xf60
[ 3308.007600][T12222] vm_mmap_pgoff+0x1af/0x280
[ 3308.012188][T12222] ? randomize_page+0xb0/0xb0
[ 3308.016863][T12222] ? __x64_sys_futex+0x1d3/0x4d0
[ 3308.021804][T12222] ? do_futex+0x360/0x360
[ 3308.026133][T12222] ksys_mmap_pgoff+0x7d/0x5a0
[ 3308.030812][T12222] ? lockdep_hardirqs_on+0x7d/0x100
[ 3308.036012][T12222] do_syscall_64+0x39/0xb0
[ 3308.040429][T12222] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 3308.046319][T12222] RIP: 0033:0x7f7b21a8c1b2
[ 3308.050735][T12222] Code: 00 00 00 00 00 0f 1f 00 41 f7 c1 ff 0f 00 00 75 27 55 48 89 fd 53 89 cb 48 85 ff 74 3b 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 66 5b 5d c3 0f 1f 00 48 c7 c0 b8 ff ff ff 64
[ 3308.070343][T12222] RSP: 002b:00007f7b21ccfaa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000009
[ 3308.078751][T12222] RAX: ffffffffffffffda RBX: 0000000000020022 RCX: 00007f7b21a8c1b2
[ 3308.086716][T12222] RDX: 0000000000000000 RSI: 0000000000021000 RDI: 0000000000000000
[ 3308.094678][T12222] RBP: 0000000000000000 R08: 00000000ffffffff R09: 0000000000000000
[ 3308.102640][T12222] R10: 0000000000020022 R11: 0000000000000246 R12: 00007f7b21ccfcb0
[ 3308.110602][T12222] R13: 00007f7b20dff700 R14: 0000000000000000 R15: 0000000000022000
[ 3308.118577][T12222]
05:09:28 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{0x0}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:28 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, 0x0, 0x0)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:29 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, 0x0, 0x0, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:29 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x0, 0x0, 0x0, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x0, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:29 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6"], 0xc9)
[ 3309.588785][T12222] memory: usage 307200kB, limit 307200kB, failcnt 7471
[ 3309.641829][T12222] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3309.658113][T12222] Memory cgroup stats for /syz1:
[ 3309.658359][T12222] anon 90112
[ 3309.658359][T12222] file 225280
[ 3309.658359][T12222] kernel 314257408
[ 3309.658359][T12222] kernel_stack 32768
[ 3309.658359][T12222] pagetables 73728
[ 3309.658359][T12222] sec_pagetables 0
[ 3309.658359][T12222] percpu 5434816
[ 3309.658359][T12222] sock 0
[ 3309.658359][T12222] vmalloc 8192
[ 3309.658359][T12222] shmem 225280
[ 3309.658359][T12222] zswap 0
[ 3309.658359][T12222] zswapped 0
[ 3309.658359][T12222] file_mapped 225280
[ 3309.658359][T12222] file_dirty 0
[ 3309.658359][T12222] file_writeback 0
[ 3309.658359][T12222] swapcached 0
[ 3309.658359][T12222] anon_thp 0
[ 3309.658359][T12222] file_thp 0
[ 3309.658359][T12222] shmem_thp 0
[ 3309.658359][T12222] inactive_anon 0
[ 3309.658359][T12222] active_anon 315392
[ 3309.658359][T12222] inactive_file 0
[ 3309.658359][T12222] active_file 0
[ 3309.658359][T12222] unevictable 0
[ 3309.658359][T12222] slab_reclaimable 52280
[ 3309.658359][T12222] slab_unreclaimable 308610400
[ 3309.658359][T12222] slab 308662680
[ 3309.658359][T12222] workingset_refault_anon 0
[ 3309.658359][T12222] workingset_refault_file 0
[ 3309.658359][T12222] workingset_activate_anon 0
[ 3309.658359][T12222] workingset_activate_file 0
[ 3309.658359][T12222] workingset_restore_anon 0
[ 3309.658359][T12222] workingset_restore_file 0
[ 3309.658359][T12222] workingset_nodereclaim 0
[ 3309.658359][T12222] pgscan 0
[ 3309.658359][T12222] pgsteal 0
[ 3309.658359][T12222] pgscan_kswapd 0
[ 3309.658359][T12222] pgscan_direct 0
[ 3309.658359][T12222] pgscan_khugepaged 0
[ 3309.658359][T12222] pgsteal_kswapd 0
[ 3309.658359][T12222] pgsteal_direct 0
[ 3309.658359][T12222] pgsteal_khugepaged 0
[ 3309.658359][T12222] pgfault 647901
[ 3309.658359][T12222] pgmajfault 0
[ 3309.658359][T12222] pgrefill 0
[ 3309.658359][T12222] pgactivate 0
[ 3309.658359][T12222] pgdeactivate 783
[ 3309.658359][T12222] pglazyfree 0
[ 3309.658359][T12222] pglazyfreed 0
[ 3309.658359][T12222] zswpin 0
[ 3309.658359][T12222] zswpout 0
[ 3309.658359][T12222] thp_fault_alloc 0
[ 3310.151333][T12222] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=12222,uid=0
[ 3310.472371][ C0] net_ratelimit: 2394 callbacks suppressed
[ 3310.472391][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3310.481102][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3310.490537][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3310.502475][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3310.514345][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3310.526851][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3310.538313][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3310.550218][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3310.562769][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3310.574644][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3310.676487][T12222] Memory cgroup out of memory: Killed process 12222 (syz-executor.1) total-vm:54416kB, anon-rss:384kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000
05:09:31 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0x2f6)
05:09:31 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, 0x0, 0x0, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:31 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x0, 0x0, 0x0, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:31 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040), 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:31 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x0, 0x0, 0x0, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x0, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:31 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x0, 0x0, 0x0, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x0, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3310.818810][T12261] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0
[ 3310.842335][T12261] CPU: 0 PID: 12261 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller #0
[ 3310.851063][T12261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3310.861110][T12261] Call Trace:
[ 3310.864379][T12261]
[ 3310.867305][T12261] dump_stack_lvl+0x136/0x150
[ 3310.871991][T12261] dump_header+0x10a/0xd70
[ 3310.876417][T12261] oom_kill_process+0x25d/0x600
[ 3310.881273][T12261] out_of_memory+0x35c/0x1660
[ 3310.885969][T12261] ? find_held_lock+0x2d/0x110
[ 3310.890765][T12261] ? oom_killer_disable+0x2b0/0x2b0
[ 3310.895966][T12261] ? rcu_read_unlock+0x9/0x60
[ 3310.900657][T12261] ? find_held_lock+0x2d/0x110
[ 3310.905430][T12261] mem_cgroup_out_of_memory+0x206/0x270
[ 3310.910977][T12261] ? mem_cgroup_margin+0x130/0x130
[ 3310.916086][T12261] ? lock_downgrade+0x690/0x690
[ 3310.920970][T12261] try_charge_memcg+0xf9b/0x13b0
[ 3310.925904][T12261] ? mem_cgroup_handle_over_high+0x520/0x520
[ 3310.931894][T12261] ? rcu_read_unlock+0x9/0x60
[ 3310.936596][T12261] ? lock_downgrade+0x690/0x690
[ 3310.941449][T12261] charge_memcg+0x90/0x3b0
[ 3310.945877][T12261] __mem_cgroup_charge+0x2b/0x90
[ 3310.950846][T12261] ? copy_mc_to_kernel+0x3e/0x90
[ 3310.955829][T12261] do_wp_page+0x8eb/0x3520
[ 3310.960275][T12261] ? lock_release+0x670/0x670
[ 3310.964949][T12261] ? finish_mkwrite_fault+0x3d0/0x3d0
[ 3310.970316][T12261] ? do_raw_spin_lock+0x124/0x2b0
[ 3310.975335][T12261] ? spin_bug+0x1c0/0x1c0
[ 3310.979669][T12261] ? lock_downgrade+0x690/0x690
[ 3310.984533][T12261] __handle_mm_fault+0x19a1/0x3e60
[ 3310.989658][T12261] ? vm_iomap_memory+0x190/0x190
[ 3310.994623][T12261] handle_mm_fault+0x2ba/0x9c0
[ 3310.999398][T12261] do_user_addr_fault+0x475/0x1230
[ 3311.004518][T12261] ? rcu_is_watching+0x12/0xb0
[ 3311.009290][T12261] exc_page_fault+0x98/0x170
[ 3311.013883][T12261] asm_exc_page_fault+0x26/0x30
[ 3311.018734][T12261] RIP: 0033:0x7f7b21a89ebe
[ 3311.023163][T12261] Code: b8 38 00 00 00 0f 05 48 3d 00 f0 ff ff 0f 87 89 00 00 00 41 89 c5 85 c0 0f 85 90 00 00 00 48 8b 05 27 09 c5 00 48 85 c0 74 04 <48> 83 00 04 49 8d 81 e0 02 00 00 48 83 3d af 90 0f 00 00 49 89 81
[ 3311.042780][T12261] RSP: 002b:00007f7b21ccfd60 EFLAGS: 00010202
[ 3311.048869][T12261] RAX: 00007f7b226d5720 RBX: 0000000000000000 RCX: 00007f7b21a89e9b
[ 3311.056836][T12261] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011
[ 3311.064803][T12261] RBP: 0000000000000001 R08: 0000000000000000 R09: 00005555561b8400
[ 3311.072767][T12261] R10: 00005555561b86d0 R11: 0000000000000246 R12: 0000000000000001
[ 3311.080728][T12261] R13: 0000000000000000 R14: 0000000000000001 R15: 00007f7b21ccfe40
[ 3311.088707][T12261]
05:09:31 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, 0x0, 0x0, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:31 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x0, 0x0, 0x0, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x0, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3311.290229][T12261] memory: usage 307200kB, limit 307200kB, failcnt 7544
[ 3311.312633][T12261] swap: usage 0kB, limit 9007199254740988kB, failcnt 0
[ 3311.353303][T12261] Memory cgroup stats for /syz1:
[ 3311.353544][T12261] anon 73728
[ 3311.353544][T12261] file 225280
[ 3311.353544][T12261] kernel 314273792
[ 3311.353544][T12261] kernel_stack 32768
[ 3311.353544][T12261] pagetables 61440
[ 3311.353544][T12261] sec_pagetables 0
[ 3311.353544][T12261] percpu 5434880
[ 3311.353544][T12261] sock 0
[ 3311.353544][T12261] vmalloc 8192
[ 3311.353544][T12261] shmem 225280
[ 3311.353544][T12261] zswap 0
[ 3311.353544][T12261] zswapped 0
[ 3311.353544][T12261] file_mapped 225280
[ 3311.353544][T12261] file_dirty 0
[ 3311.353544][T12261] file_writeback 0
[ 3311.353544][T12261] swapcached 0
[ 3311.353544][T12261] anon_thp 0
[ 3311.353544][T12261] file_thp 0
[ 3311.353544][T12261] shmem_thp 0
[ 3311.353544][T12261] inactive_anon 0
[ 3311.353544][T12261] active_anon 299008
[ 3311.353544][T12261] inactive_file 0
[ 3311.353544][T12261] active_file 0
[ 3311.353544][T12261] unevictable 0
[ 3311.353544][T12261] slab_reclaimable 59224
[ 3311.353544][T12261] slab_unreclaimable 308628144
[ 3311.353544][T12261] slab 308687368
[ 3311.353544][T12261] workingset_refault_anon 0
[ 3311.353544][T12261] workingset_refault_file 0
[ 3311.353544][T12261] workingset_activate_anon 0
[ 3311.353544][T12261] workingset_activate_file 0
[ 3311.353544][T12261] workingset_restore_anon 0
[ 3311.353544][T12261] workingset_restore_file 0
[ 3311.353544][T12261] workingset_nodereclaim 0
[ 3311.353544][T12261] pgscan 0
[ 3311.353544][T12261] pgsteal 0
[ 3311.353544][T12261] pgscan_kswapd 0
[ 3311.353544][T12261] pgscan_direct 0
[ 3311.353544][T12261] pgscan_khugepaged 0
[ 3311.353544][T12261] pgsteal_kswapd 0
[ 3311.353544][T12261] pgsteal_direct 0
[ 3311.353544][T12261] pgsteal_khugepaged 0
[ 3311.353544][T12261] pgfault 647917
[ 3311.353544][T12261] pgmajfault 0
[ 3311.353544][T12261] pgrefill 0
[ 3311.353544][T12261] pgactivate 0
[ 3311.353544][T12261] pgdeactivate 783
[ 3311.353544][T12261] pglazyfree 0
[ 3311.353544][T12261] pglazyfreed 0
[ 3311.353544][T12261] zswpin 0
[ 3311.353544][T12261] zswpout 0
[ 3311.353544][T12261] thp_fault_alloc 0
05:09:32 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640), 0x0, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:32 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640), 0x0, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:32 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640), 0x0, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:32 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34b"], 0xc9)
[ 3312.306257][T12261] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=5124,uid=0
[ 3312.388821][T12261] Memory cgroup out of memory: Killed process 5124 (syz-executor.1) total-vm:50576kB, anon-rss:376kB, file-rss:8960kB, shmem-rss:0kB, UID:0 pgtables:76kB oom_score_adj:0
[ 3315.478747][ C0] net_ratelimit: 3587 callbacks suppressed
[ 3315.478768][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3315.478849][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3315.484836][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3315.496908][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3315.508802][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3315.529398][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3315.533361][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3315.544683][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3315.556489][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3315.569177][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
05:09:39 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0x300)
05:09:39 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040), 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:39 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x0, 0x0, 0x0, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x0, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:39 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{0x0}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:39 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x0, 0x0, 0x0, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x0, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:39 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34b"], 0xc9)
05:09:39 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{0x0}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3319.881538][ T2583] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
05:09:40 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x15}]}}}]}, 0x44}}, 0x30c)
05:09:40 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{0x0}], 0x1, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3320.509174][ C0] net_ratelimit: 4135 callbacks suppressed
[ 3320.509202][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3320.527462][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3320.539693][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3320.551974][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3320.564498][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3320.576869][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3320.589062][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3320.601295][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3320.613826][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3320.626132][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
05:09:41 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040), 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:41 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(0x0, 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:41 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x0, 0x0, 0x0, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x0, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:41 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x4e20, 0x9, 0x4e21, 0x9, 0x2, 0x20, 0x80, 0x21}, {0x0, 0x3ff, 0x0, 0x7, 0x0, 0x3, 0x4}, {0x80000001, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x0, 0x7fffffff}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34b"], 0xc9)
05:09:41 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640), 0x0, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:42 executing program 3:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x0, 0x0, 0x0, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x0, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:42 executing program 2:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(0xffffffffffffffff, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:42 executing program 4:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x0, 0x0, 0x0, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x0, 0x4, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3321.880601][ T2583] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
05:09:42 executing program 5:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(0x0, 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
05:09:42 executing program 0:
open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0)
r0 = getpid()
process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)
r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'})
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0xffffffffffffff28, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in6=@remote, 0x0, 0x0, 0x4e21, 0x0, 0x0, 0x0, 0x0, 0x21}, {0x200, 0x3ff, 0x0, 0x7, 0xad, 0x3, 0x0, 0x80}, {0x80000001, 0x0, 0x10000, 0x5}, 0xfffffffb, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x1, 0x1, 0x6, 0x401, 0x7fffffff, 0x85}}, 0xe8)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
sendfile(r3, r1, 0x0, 0x800100020013)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a3084ada0254bc645cd7402ca05b8909e7f816dec94a3865f959e3ab3232e95fcc95eb0b0d7b72e587dbc190bf4aae3844db0144c39834ad410a9e5d684e198be987b9020c621b80ace49e9c4cf3f256e5506684fd8b73c5f5e4ce4e4f31ae114a7aa0637a50ee7dd0442dcc4541e76dfe15d6f13c02e60427f8c4c0d3c77be5a777461e0268ec3b84c231ae9876360a34be6c0"], 0xc9)
[ 3324.099531][ T2583] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 3325.471606][ T2583] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 3325.519204][ C1] net_ratelimit: 3366 callbacks suppressed
[ 3325.519224][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3325.519858][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3325.525427][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3325.537290][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3325.549814][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3325.561231][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3325.573297][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3325.585145][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3325.597546][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3325.609667][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3326.292804][T12356] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9
[ 3326.301811][T12356] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9
[ 3326.311542][T12356] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4
[ 3326.319078][T12356] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3
[ 3326.326812][T12356] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2
[ 3327.187440][T12359] chnl_net:caif_netlink_parms(): no params data found
[ 3327.476287][T12359] bridge0: port 1(bridge_slave_0) entered blocking state
[ 3327.532844][ T1202] ieee802154 phy0 wpan0: encryption failed: -22
[ 3327.539235][ T1202] ieee802154 phy1 wpan1: encryption failed: -22
[ 3327.571593][T12359] bridge0: port 1(bridge_slave_0) entered disabled state
[ 3327.614668][T12359] bridge_slave_0: entered allmulticast mode
[ 3327.649575][T12359] bridge_slave_0: entered promiscuous mode
[ 3327.669982][T12359] bridge0: port 2(bridge_slave_1) entered blocking state
[ 3327.677108][T12359] bridge0: port 2(bridge_slave_1) entered disabled state
[ 3327.779207][T12359] bridge_slave_1: entered allmulticast mode
[ 3327.791712][T12359] bridge_slave_1: entered promiscuous mode
[ 3327.906491][T12359] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 3327.973975][T12359] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 3328.095239][T12359] team0: Port device team_slave_0 added
[ 3328.110278][T12359] team0: Port device team_slave_1 added
[ 3328.416219][ T4394] Bluetooth: hci0: command 0x0409 tx timeout
[ 3328.575085][T12359] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 3328.588542][T12359] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 3328.668550][T12359] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 3328.692109][T12359] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 3328.711658][T12359] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 3328.810875][T12359] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 3329.271725][T12359] hsr_slave_0: entered promiscuous mode
[ 3329.352800][T12359] hsr_slave_1: entered promiscuous mode
[ 3329.398617][T12359] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[ 3329.406244][T12359] Cannot create hsr debugfs directory
[ 3330.539393][ C0] net_ratelimit: 3577 callbacks suppressed
[ 3330.539413][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3330.558263][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3330.570650][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3330.583024][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3330.592347][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3330.595240][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3330.607135][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3330.619577][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3330.631600][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3330.642980][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3330.672884][ T4394] Bluetooth: hci0: command 0x041b tx timeout
[ 3332.788538][ T4394] Bluetooth: hci0: command 0x040f tx timeout
[ 3334.868919][T24253] Bluetooth: hci0: command 0x0419 tx timeout
[ 3335.559668][ C0] net_ratelimit: 3891 callbacks suppressed
[ 3335.559688][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3335.559722][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3335.566413][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3335.577788][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3335.589652][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3335.602160][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3335.613569][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3335.625641][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3335.637494][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3335.649913][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3340.579528][ C0] net_ratelimit: 4213 callbacks suppressed
[ 3340.579546][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3340.590913][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3340.597757][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3340.609587][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3340.621470][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3340.634028][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3340.645437][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3340.657354][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3340.669834][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3340.681669][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3345.588632][ C0] net_ratelimit: 4239 callbacks suppressed
[ 3345.588651][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3345.596997][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3345.606760][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3345.619354][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3345.630671][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3345.642615][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3345.667161][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3345.679480][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3345.692359][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3345.704674][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3350.598793][ C0] net_ratelimit: 4166 callbacks suppressed
[ 3350.598812][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3350.604700][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3350.616946][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3350.628895][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3350.640766][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3350.653230][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3350.665260][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3350.676541][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3350.688532][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3350.700912][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3355.617553][ C1] net_ratelimit: 4083 callbacks suppressed
[ 3355.617571][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3355.635809][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3355.648406][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3355.648707][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3355.660660][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3355.672642][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3355.684498][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3355.696952][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3355.708976][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3355.720274][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3360.649639][ C0] net_ratelimit: 4052 callbacks suppressed
[ 3360.649659][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3360.651664][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3360.655849][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3360.667839][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3360.679690][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3360.692185][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3360.703681][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3360.715592][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3360.728091][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3360.739878][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3365.659152][ C1] net_ratelimit: 4111 callbacks suppressed
[ 3365.659173][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3365.659966][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3365.665330][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3365.677247][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3365.689707][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3365.701168][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3365.715371][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3365.725128][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3365.737557][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3365.749649][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3370.678633][ C1] net_ratelimit: 4085 callbacks suppressed
[ 3370.678660][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3370.697502][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3370.709842][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3370.711855][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3370.722684][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3370.734146][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3370.746047][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3370.757931][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3370.770500][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3370.781884][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3375.695330][ C1] net_ratelimit: 3981 callbacks suppressed
[ 3375.695348][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3375.699242][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3375.702020][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3375.713443][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3375.725492][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3375.737341][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3375.749716][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3375.761810][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3375.773149][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3375.785032][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3380.700873][ C1] net_ratelimit: 4276 callbacks suppressed
[ 3380.700894][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3380.719689][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3380.732005][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3380.744889][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3380.755313][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3380.757157][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3380.769587][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3380.781450][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3380.792956][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3380.804894][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3385.739147][ C0] net_ratelimit: 4877 callbacks suppressed
[ 3385.739168][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3385.756220][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3385.757405][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3385.769810][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3385.781243][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3385.793318][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3385.805159][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3385.817587][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3385.829624][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3385.840969][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3388.938363][ T1202] ieee802154 phy0 wpan0: encryption failed: -22
[ 3388.944745][ T1202] ieee802154 phy1 wpan1: encryption failed: -22
[ 3390.758910][ C0] net_ratelimit: 4815 callbacks suppressed
[ 3390.758930][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3390.777192][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3390.789567][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3390.801882][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3390.814929][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3390.827341][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3390.827455][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3390.839578][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3390.852090][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3390.863578][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3393.298587][T24253] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9
[ 3393.338674][T12356] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9
[ 3393.363634][T12356] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4
[ 3393.371174][T12356] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3
[ 3393.378417][T12356] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2
[ 3395.568696][ T4394] Bluetooth: hci6: command 0x0409 tx timeout
[ 3395.768787][ C1] net_ratelimit: 4447 callbacks suppressed
[ 3395.768807][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3395.788158][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3395.800453][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3395.813341][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3395.819304][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3395.825592][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3395.837508][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3395.850159][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3395.861509][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3395.873494][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3397.695991][ T4394] Bluetooth: hci6: command 0x041b tx timeout
[ 3399.834277][ T4394] Bluetooth: hci6: command 0x040f tx timeout
[ 3400.781656][ C1] net_ratelimit: 4788 callbacks suppressed
[ 3400.781677][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3400.800507][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3400.806651][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3400.812828][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3400.824732][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3400.837281][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3400.848741][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3400.860690][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3400.872546][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3400.885134][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3401.894346][T24253] Bluetooth: hci6: command 0x0419 tx timeout
[ 3405.788731][ C1] net_ratelimit: 5945 callbacks suppressed
[ 3405.788753][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3405.803310][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3405.806893][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3405.818735][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3405.831235][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3405.842720][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3405.854693][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3405.866536][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3405.879128][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3405.891000][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3408.452661][ T2583] hsr_slave_0: left promiscuous mode
[ 3408.471735][ T2583] hsr_slave_1: left promiscuous mode
[ 3408.496700][ T2583] batman_adv: batadv0: Interface deactivated: batadv_slave_0
[ 3408.518239][ T2583] batman_adv: batadv0: Removing interface: batadv_slave_0
[ 3408.553881][ T2583] batman_adv: batadv0: Interface deactivated: batadv_slave_1
[ 3408.581272][ T2583] batman_adv: batadv0: Removing interface: batadv_slave_1
[ 3408.625986][ T2583] bridge_slave_1: left allmulticast mode
[ 3408.631734][ T2583] bridge_slave_1: left promiscuous mode
[ 3408.639099][ T2583] bridge0: port 2(bridge_slave_1) entered disabled state
[ 3408.691070][ T2583] bridge_slave_0: left allmulticast mode
[ 3408.696771][ T2583] bridge_slave_0: left promiscuous mode
[ 3408.716392][ T2583] bridge0: port 1(bridge_slave_0) entered disabled state
[ 3408.950936][ T2583] veth1_macvtap: left promiscuous mode
[ 3408.957158][ T2583] veth0_macvtap: left promiscuous mode
[ 3408.987264][ T2583] veth1_vlan: left promiscuous mode
[ 3408.992929][ T2583] veth0_vlan: left promiscuous mode
[ 3410.798715][ C1] net_ratelimit: 11687 callbacks suppressed
[ 3410.798735][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3410.799306][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3410.804968][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3410.816824][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3410.829367][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3410.840760][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3410.852867][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3410.864684][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3410.877133][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3410.889242][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3415.808715][ C1] net_ratelimit: 15724 callbacks suppressed
[ 3415.808737][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3415.810923][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3415.815482][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3415.826935][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3415.839010][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3415.850778][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3415.863345][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3415.874800][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3415.886814][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3415.899409][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3420.818518][ C1] net_ratelimit: 15807 callbacks suppressed
[ 3420.818539][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3420.819112][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3420.824741][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3420.836637][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3420.849136][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3420.860563][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3420.872678][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3420.884517][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3420.896899][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3420.909009][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3425.828681][ C1] net_ratelimit: 15580 callbacks suppressed
[ 3425.828700][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3425.828938][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3425.834919][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3425.846804][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3425.859300][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3425.870808][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3425.882940][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3425.894772][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3425.907186][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3425.919291][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3430.838644][ C1] net_ratelimit: 15659 callbacks suppressed
[ 3430.838664][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3430.843337][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3430.844906][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3430.856737][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3430.869249][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3430.880762][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3430.892701][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3430.905137][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3430.916947][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3430.928433][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3435.848600][ C0] net_ratelimit: 15736 callbacks suppressed
[ 3435.848620][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3435.848722][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3435.854728][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3435.866845][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3435.878724][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3435.891114][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3435.903219][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3435.914536][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3435.926392][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3435.938904][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3440.858581][ C0] net_ratelimit: 15826 callbacks suppressed
[ 3440.858601][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3440.866565][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3440.876782][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3440.888819][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3440.900727][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3440.913208][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3440.925222][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3440.936511][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3440.948435][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3440.960897][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3445.870184][ C1] net_ratelimit: 15203 callbacks suppressed
[ 3445.870204][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3445.873074][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3445.876851][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3445.888478][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3445.900485][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3445.912303][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3445.924808][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3445.936320][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3445.948235][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3445.960691][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3450.361207][ T1202] ieee802154 phy0 wpan0: encryption failed: -22
[ 3450.367560][ T1202] ieee802154 phy1 wpan1: encryption failed: -22
[ 3450.878548][ C0] net_ratelimit: 15374 callbacks suppressed
[ 3450.878569][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3450.879138][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3450.884710][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3450.896823][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3450.908744][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3450.921070][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3450.942943][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3450.944490][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3450.956349][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3450.968861][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3452.438374][ T4394] Bluetooth: hci0: command 0x0406 tx timeout
[ 3455.585780][T24253] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1
[ 3455.607836][T24253] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9
[ 3455.629612][T24253] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9
[ 3455.689343][T24253] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4
[ 3455.718353][T24253] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3
[ 3455.745867][T24253] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2
[ 3455.888729][ C1] net_ratelimit: 14280 callbacks suppressed
[ 3455.888748][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3455.889185][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3455.894993][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3455.906877][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3455.920986][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3455.930823][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3455.942878][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3455.954733][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3455.967137][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3455.979250][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3457.896548][T24253] Bluetooth: hci6: command 0x0409 tx timeout
[ 3459.969581][T24253] Bluetooth: hci6: command 0x041b tx timeout
[ 3460.898701][ C1] net_ratelimit: 15746 callbacks suppressed
[ 3460.898721][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3460.899274][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3460.928937][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3460.941219][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3460.942327][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3460.953445][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3460.965914][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3460.977879][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3460.989270][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3461.001298][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3462.044980][ T4394] Bluetooth: hci6: command 0x040f tx timeout
[ 3464.128204][ T4394] Bluetooth: hci6: command 0x0419 tx timeout
[ 3465.908562][ C0] net_ratelimit: 15649 callbacks suppressed
[ 3465.908583][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3465.908835][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3465.915346][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3465.927150][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3465.938773][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3465.950764][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3465.962605][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3465.975105][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3465.986672][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3465.998682][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3470.918615][ C0] net_ratelimit: 15901 callbacks suppressed
[ 3470.918637][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3470.920562][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3470.925387][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3470.936772][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3470.948699][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3470.961183][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3470.972630][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3470.984687][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3470.996570][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3471.008961][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3475.928500][ C0] net_ratelimit: 15920 callbacks suppressed
[ 3475.928526][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3475.929700][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3475.934738][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3475.946690][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3475.963368][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3475.970966][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3475.982484][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3475.994542][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3476.006339][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3476.018883][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3480.938657][ C1] net_ratelimit: 15620 callbacks suppressed
[ 3480.938677][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3480.938745][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3480.945423][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3480.956876][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3480.968997][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3480.980794][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3480.993442][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3481.004907][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3481.016832][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3481.029464][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3485.948584][ C0] net_ratelimit: 15816 callbacks suppressed
[ 3485.948604][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3485.948853][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3485.955437][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3485.967205][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3485.978737][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3485.990763][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3486.002625][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3486.015199][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3486.026755][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3486.038662][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3490.958693][ C1] net_ratelimit: 15865 callbacks suppressed
[ 3490.958715][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3490.962329][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3490.964930][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3490.976815][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3490.989298][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3491.000761][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3491.012955][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3491.024827][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3491.037173][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3491.049327][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3495.968732][ C1] net_ratelimit: 15782 callbacks suppressed
[ 3495.968751][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3495.969054][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3495.974966][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3495.986911][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3495.999502][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3496.010968][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3496.023016][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3496.034874][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3496.047252][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3496.059348][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3500.978519][ C0] net_ratelimit: 15783 callbacks suppressed
[ 3500.978538][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3500.978621][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3500.985310][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3500.996749][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3501.008676][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3501.021132][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3501.032546][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3501.044606][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3501.056472][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3501.068892][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3505.988694][ C0] net_ratelimit: 15732 callbacks suppressed
[ 3505.988714][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3505.988954][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3505.994852][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3506.006977][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3506.018843][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3506.033178][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3506.043344][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3506.054665][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3506.066514][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3506.079012][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3510.998823][ C0] net_ratelimit: 15062 callbacks suppressed
[ 3510.998842][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3511.000348][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3511.005073][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3511.017124][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3511.028944][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3511.041527][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3511.053036][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3511.064937][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3511.077387][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3511.089177][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3511.801316][ T1202] ieee802154 phy0 wpan0: encryption failed: -22
[ 3511.807677][ T1202] ieee802154 phy1 wpan1: encryption failed: -22
[ 3516.008628][ C0] net_ratelimit: 14816 callbacks suppressed
[ 3516.008646][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3516.026971][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3516.029215][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3516.039258][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3516.051268][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3516.063143][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3516.075647][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3516.087597][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3516.098935][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3516.110873][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3517.826930][ T4394] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1
[ 3517.836494][ T4394] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9
[ 3517.856947][ T4394] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9
[ 3517.904643][ T4394] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4
[ 3517.933981][ T4394] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3
[ 3517.952069][ T4394] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2
[ 3520.039646][T12356] Bluetooth: hci6: command 0x0409 tx timeout
[ 3521.018705][ C1] net_ratelimit: 15143 callbacks suppressed
[ 3521.018723][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3521.031595][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3521.036905][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3521.048822][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3521.061242][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3521.072710][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3521.084699][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3521.096543][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3521.109038][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3521.121006][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3522.109884][T24253] Bluetooth: hci6: command 0x041b tx timeout
[ 3524.202084][T12356] Bluetooth: hci6: command 0x040f tx timeout
[ 3526.028518][ C1] net_ratelimit: 15818 callbacks suppressed
[ 3526.028537][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3526.031377][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3526.034753][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3526.046625][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3526.059127][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3526.070550][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3526.082627][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3526.094529][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3526.106884][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3526.119014][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3526.274624][T24253] Bluetooth: hci6: command 0x0419 tx timeout
[ 3531.038495][ C0] net_ratelimit: 15833 callbacks suppressed
[ 3531.038515][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3531.038544][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3531.044656][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3531.057206][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3531.068708][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3531.080620][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3531.093055][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3531.104973][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3531.116525][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3531.128543][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3536.050598][ C0] net_ratelimit: 16023 callbacks suppressed
[ 3536.050617][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3536.052895][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3536.056798][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:43:85:45:36:5a, vlan:0)
[ 3536.068839][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3536.080726][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 3536.093509][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3536.105016][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3536.116960][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3536.129433][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3536.141200][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 3538.040159][ T28] INFO: task syz-executor.1:12359 blocked for more than 143 seconds.
[ 3538.048301][ T28] Not tainted 6.3.0-rc7-syzkaller #0
[ 3538.056250][ T28] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 3538.076409][ T28] task:syz-executor.1 state:D stack:24448 pid:12359 ppid:1 flags:0x00004004
[ 3538.116753][ T28] Call Trace:
[ 3538.122067][ T28]
[ 3538.125046][ T28] __schedule+0xc91/0x5770
[ 3538.140408][ T28] ? io_schedule_timeout+0x150/0x150
[ 3538.145758][ T28] ? rwsem_down_write_slowpath+0x3b8/0x1220
[ 3538.160566][ T28] schedule+0xde/0x1a0
[ 3538.164691][ T28] schedule_preempt_disabled+0x13/0x20
[ 3538.181481][ T28] rwsem_down_write_slowpath+0x3e2/0x1220
[ 3538.187539][ T28] ? down_timeout+0x90/0x90
[ 3538.233426][ T28] ? lock_release+0x670/0x670
[ 3538.238203][ T28] down_write+0x1d2/0x200
[ 3538.255576][ T28] ? rwsem_down_write_slowpath+0x1220/0x1220
[ 3538.270736][ T28] ? nsim_drv_remove+0x11e/0x1d0
[ 3538.275877][ T28] unregister_netdevice_notifier+0x22/0x180
[ 3538.312111][ T28] devlink_free+0x2cb/0x460
[ 3538.316747][ T28] nsim_drv_remove+0x158/0x1d0
[ 3538.324002][ T28] ? nsim_num_vf+0x50/0x50
[ 3538.339752][ T28] device_remove+0xc8/0x170
[ 3538.344400][ T28] device_release_driver_internal+0x443/0x610
[ 3538.361487][ T28] ? put_device+0x1f/0x30
[ 3538.365890][ T28] bus_remove_device+0x22c/0x420
[ 3538.382387][ T28] device_del+0x48a/0xb80
[ 3538.387051][ T28] ? __device_link_del+0x380/0x380
[ 3538.432117][ T28] ? trace_contention_end+0xd8/0x100
[ 3538.437500][ T28] device_unregister+0x1e/0xc0
[ 3538.453601][ T28] del_device_store+0x34e/0x4a0
[ 3538.458828][ T28] ? nsim_bus_probe+0x20/0x20
[ 3538.463567][ T28] ? nsim_bus_probe+0x20/0x20
[ 3538.468307][ T28] ? sysfs_file_ops+0x1c0/0x1c0
[ 3538.502382][ T28] bus_attr_store+0x76/0xa0
[ 3538.506960][ T28] ? bus_attr_show+0x90/0x90
[ 3538.523111][ T28] sysfs_kf_write+0x114/0x170
[ 3538.527874][ T28] kernfs_fop_write_iter+0x3f1/0x600
[ 3538.552951][ T28] vfs_write+0x9ed/0xe10
[ 3538.557257][ T28] ? kernel_write+0x670/0x670
[ 3538.584042][ T28] ? build_open_flags+0x6f0/0x6f0
[ 3538.606557][ T28] ? __fget_light+0x20a/0x270
[ 3538.626175][ T28] ksys_write+0x12b/0x250
[ 3538.639358][ T28] ? __ia32_sys_read+0xb0/0xb0
[ 3538.644175][ T28] ? syscall_enter_from_user_mode+0x26/0x80
[ 3538.661185][ T28] do_syscall_64+0x39/0xb0
[ 3538.665673][ T28] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 3538.680768][ T28] RIP: 0033:0x7f134da3deef
[ 3538.685228][ T28] RSP: 002b:00007f134dccf220 EFLAGS: 00000293 ORIG_RAX: 0000000000000001
[ 3538.723313][ T28] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f134da3deef
[ 3538.746218][ T28] RDX: 0000000000000001 RSI: 00007f134dccf270 RDI: 0000000000000005
[ 3538.775266][ T28] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f134dccf1c0
[ 3538.783675][ T28] R10: 0000000000000000 R11: 0000000000000293 R12: 00007f134dae78b6
[ 3538.820527][ T28] R13: 00007f134dccf270 R14: 0000000000000000 R15: 00007f134dccf940
[ 3538.828894][ T28]
[ 3538.836265][ T28]
[ 3538.836265][ T28] Showing all locks held in the system:
[ 3538.863678][ T28] 1 lock held by rcu_tasks_kthre/12:
[ 3538.871147][ T28] #0: ffffffff8c794a70 (rcu_tasks.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x31/0xd80
[ 3538.925827][ T28] 1 lock held by rcu_tasks_trace/13:
[ 3538.948438][ T28] #0: ffffffff8c794770 (rcu_tasks_trace.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x31/0xd80
[ 3538.970757][ T28] 1 lock held by khungtaskd/28:
[ 3538.975649][ T28] #0: ffffffff8c7955c0 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x55/0x340
[ 3539.006390][ T28] 2 locks held by getty/4749:
[ 3539.023469][ T28] #0: ffff88802bf8c098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x26/0x80
[ 3539.046407][ T28] #1: ffffc900015902f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0xef4/0x13e0
[ 3539.076374][ T28] 5 locks held by kworker/u4:29/2583:
[ 3539.091042][ T28] #0: ffff888016617138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x87a/0x15c0
[ 3539.131348][ T28] #1: ffffc900031afda8 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x8ae/0x15c0
[ 3539.154540][ T28] #2: ffffffff8e0e26d0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9f/0xb10
[ 3539.187169][ T28] #3: ffffffff8e0f6208 (rtnl_mutex){+.+.}-{3:3}, at: default_device_exit_batch+0x92/0x5b0
[ 3539.206487][ T28] #4: ffffffff8c7a0780 (rcu_state.barrier_mutex){+.+.}-{3:3}, at: rcu_barrier+0x48/0x6a0
[ 3539.275195][ T28] 3 locks held by kworker/1:3/21732:
[ 3539.293548][ T28] #0: ffff888012470d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x87a/0x15c0
[ 3539.324232][ T28] #1: ffffc9000c3e7da8 (deferred_process_work){+.+.}-{0:0}, at: process_one_work+0x8ae/0x15c0
[ 3539.356445][ T28] #2: ffffffff8e0f6208 (rtnl_mutex){+.+.}-{3:3}, at: switchdev_deferred_process_work+0xe/0x20
[ 3539.386802][ T28] 3 locks held by kworker/1:0/30117:
[ 3539.392444][ T28] #0: ffff8880277c1538 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x87a/0x15c0
[ 3539.403799][ T28] #1: ffffc9000501fda8 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_one_work+0x8ae/0x15c0
[ 3539.456779][ T28] #2: ffffffff8e0f6208 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0x12/0x30
[ 3539.470143][ T28] 3 locks held by kworker/0:1/3545:
[ 3539.475382][ T28] #0: ffff8880277c1538 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x87a/0x15c0
[ 3539.515195][ T28] #1: ffffc900168a7da8 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_one_work+0x8ae/0x15c0
[ 3539.539758][ T28] #2: ffffffff8e0f6208 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0x12/0x30
[ 3539.587993][ T28] 3 locks held by kworker/1:2/11491:
[ 3539.595439][ T28] #0: ffff888012470d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x87a/0x15c0
[ 3539.617304][ T28] #1: ffffc9000377fda8 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x8ae/0x15c0
[ 3539.658041][ T28] #2: ffffffff8e0f6208 (rtnl_mutex){+.+.}-{3:3}, at: linkwatch_event+0xf/0x70
[ 3539.675868][ T28] 6 locks held by syz-executor.1/12359:
[ 3539.692624][ T28] #0: ffff88802bfea460 (sb_writers#8){.+.+}-{0:0}, at: ksys_write+0x12b/0x250
[ 3539.724568][ T28] #1: ffff88804b515c88 (&of->mutex){+.+.}-{3:3}, at: kernfs_fop_write_iter+0x285/0x600
[ 3539.743410][ T28] #2: ffff8881471b70f0 (kn->active#51){.+.+}-{0:0}, at: kernfs_fop_write_iter+0x2a9/0x600
[ 3539.783614][ T28] #3: ffffffff8d7e1748 (nsim_bus_dev_list_lock){+.+.}-{3:3}, at: del_device_store+0xc9/0x4a0
[ 3539.796181][ T28] #4: ffff8880415c80e8 (&dev->mutex){....}-{3:3}, at: device_release_driver_internal+0xa4/0x610
[ 3539.818294][ T28] #5: ffffffff8e0e26d0 (pernet_ops_rwsem){++++}-{3:3}, at: unregister_netdevice_notifier+0x22/0x180
[ 3539.900045][ T28] 1 lock held by syz-executor.1/12860:
[ 3539.905582][ T28] #0: ffffffff8e0e26d0 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4cb/0x8e0
[ 3539.945145][ T28]
[ 3539.947534][ T28] =============================================
[ 3539.947534][ T28]
[ 3539.970498][ T28] NMI backtrace for cpu 1
[ 3539.974878][ T28] CPU: 1 PID: 28 Comm: khungtaskd Not tainted 6.3.0-rc7-syzkaller #0
[ 3539.982972][ T28] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3539.993064][ T28] Call Trace:
[ 3539.996357][ T28]
[ 3539.999303][ T28] dump_stack_lvl+0xd9/0x150
[ 3540.003928][ T28] nmi_cpu_backtrace+0x29c/0x350
[ 3540.008920][ T28] ? lapic_can_unplug_cpu+0xa0/0xa0
[ 3540.014146][ T28] nmi_trigger_cpumask_backtrace+0x2a4/0x300
[ 3540.020176][ T28] watchdog+0xe16/0x1090
[ 3540.024453][ T28] ? proc_dohung_task_timeout_secs+0x80/0x80
[ 3540.030475][ T28] kthread+0x2e8/0x3a0
[ 3540.034578][ T28] ? kthread_complete_and_exit+0x40/0x40
[ 3540.040258][ T28] ret_from_fork+0x1f/0x30
[ 3540.044734][ T28]
[ 3540.047825][ T28] Sending NMI from CPU 1 to CPUs 0:
[ 3540.053086][ C0] NMI backtrace for cpu 0
[ 3540.053095][ C0] CPU: 0 PID: 2587 Comm: kworker/u4:31 Not tainted 6.3.0-rc7-syzkaller #0
[ 3540.053116][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3540.053128][ C0] Workqueue: events_unbound toggle_allocation_gate
[ 3540.053154][ C0] RIP: 0010:debug_object_activate+0x180/0x3e0
[ 3540.053182][ C0] Code: ed 74 48 49 bd 00 00 00 00 00 fc ff df 48 8d 7d 18 83 c3 01 48 89 f8 48 c1 e8 03 42 80 3c 28 00 0f 85 c6 01 00 00 4c 3b 65 18 <0f> 84 bf 00 00 00 48 89 e8 48 c1 e8 03 42 80 3c 28 00 0f 85 c6 01
[ 3540.053200][ C0] RSP: 0018:ffffc9000344f9c8 EFLAGS: 00000002
[ 3540.053214][ C0] RAX: 1ffff1100fc97f22 RBX: 0000000000000023 RCX: ffffffff816511b4
[ 3540.053227][ C0] RDX: 1ffffffff2406e57 RSI: 0000000000000002 RDI: ffff88807e4bf910
[ 3540.053239][ C0] RBP: ffff88807e4bf8f8 R08: ffffffff920372a8 R09: 0000000000000003
[ 3540.053251][ C0] R10: fffff52000689f27 R11: 0000000000000000 R12: ffffffff91dc6908
[ 3540.053263][ C0] R13: dffffc0000000000 R14: 1ffff92000689f3b R15: ffffffff8a4eb520
[ 3540.053276][ C0] FS: 0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000
[ 3540.053295][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 3540.053309][ C0] CR2: 000055b260089de8 CR3: 000000000c571000 CR4: 00000000003506f0
[ 3540.053321][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 3540.053332][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 3540.053344][ C0] Call Trace:
[ 3540.053349][ C0]
[ 3540.053356][ C0] ? debug_object_assert_init+0x2e0/0x2e0
[ 3540.053383][ C0] ? get_nohz_timer_target+0x21/0x640
[ 3540.053464][ C0] __mod_timer+0x80d/0xe80
[ 3540.053492][ C0] ? __mutex_unlock_slowpath+0x157/0x5e0
[ 3540.053514][ C0] ? timer_shutdown_sync+0x20/0x20
[ 3540.053540][ C0] ? __mutex_unlock_slowpath+0x157/0x5e0
[ 3540.053560][ C0] ? find_held_lock+0x2d/0x110
[ 3540.053590][ C0] ? toggle_allocation_gate+0x143/0x230
[ 3540.053614][ C0] add_timer+0x62/0x90
[ 3540.053639][ C0] __queue_delayed_work+0x1a7/0x270
[ 3540.053665][ C0] queue_delayed_work_on+0x109/0x120
[ 3540.053691][ C0] toggle_allocation_gate+0x188/0x230
[ 3540.053714][ C0] ? wake_up_kfence_timer+0x30/0x30
[ 3540.053737][ C0] ? prepare_to_wait_exclusive+0x2c0/0x2c0
[ 3540.053757][ C0] ? _raw_spin_unlock_irq+0x23/0x50
[ 3540.053784][ C0] process_one_work+0x991/0x15c0
[ 3540.053811][ C0] ? pwq_dec_nr_in_flight+0x2a0/0x2a0
[ 3540.053836][ C0] ? spin_bug+0x1c0/0x1c0
[ 3540.053856][ C0] ? _raw_spin_lock_irq+0x45/0x50
[ 3540.053882][ C0] worker_thread+0x669/0x1090
[ 3540.053909][ C0] ? process_one_work+0x15c0/0x15c0
[ 3540.053934][ C0] kthread+0x2e8/0x3a0
[ 3540.053952][ C0] ? kthread_complete_and_exit+0x40/0x40
[ 3540.053973][ C0] ret_from_fork+0x1f/0x30
[ 3540.054010][ C0]
[ 3540.477142][ T28] Kernel panic - not syncing: hung_task: blocked tasks
[ 3540.484057][ T28] CPU: 0 PID: 28 Comm: khungtaskd Not tainted 6.3.0-rc7-syzkaller #0
[ 3540.492157][ T28] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
[ 3540.502235][ T28] Call Trace:
[ 3540.505592][ T28]
[ 3540.508573][ T28] dump_stack_lvl+0xd9/0x150
[ 3540.513198][ T28] panic+0x688/0x730
[ 3540.517129][ T28] ? panic_smp_self_stop+0x90/0x90
[ 3540.522315][ T28] ? lapic_can_unplug_cpu+0xa0/0xa0
[ 3540.527546][ T28] ? preempt_schedule_thunk+0x1a/0x20
[ 3540.532964][ T28] ? watchdog+0xbe8/0x1090
[ 3540.537416][ T28] watchdog+0xbf9/0x1090
[ 3540.541689][ T28] ? proc_dohung_task_timeout_secs+0x80/0x80
[ 3540.547701][ T28] kthread+0x2e8/0x3a0
[ 3540.551800][ T28] ? kthread_complete_and_exit+0x40/0x40
[ 3540.557467][ T28] ret_from_fork+0x1f/0x30
[ 3540.561939][ T28]
[ 3540.565138][ T28] Kernel Offset: disabled
[ 3540.569469][ T28] Rebooting in 86400 seconds..