, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:00:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x3000000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:00:53 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x60, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x60}}, 0x0) 10:00:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x4000000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 946.080190][ T1510] vcan0: tx drop: invalid da for name 0x000000da8378c719 [ 946.093889][ T27] audit: type=1804 audit(1585908053.268:1131): pid=1502 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/671/cgroup.controllers" dev="sda1" ino=16177 res=1 [ 946.113596][ T1513] vcan0: tx drop: invalid da for name 0x000000da8378c719 10:00:53 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0x40030000000000}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) [ 946.187695][ T27] audit: type=1804 audit(1585908053.358:1132): pid=1512 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/596/cgroup.controllers" dev="sda1" ino=16221 res=1 [ 946.279537][ T1502] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:00:53 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x60, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x60}}, 0x0) 10:00:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x5000000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 946.323447][ T1527] vcan0: tx drop: invalid da for name 0x0040030000000000 10:00:53 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0xee000000000000}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) [ 946.383693][ T1531] vcan0: tx drop: invalid da for name 0x0040030000000000 [ 946.515788][ T1537] vcan0: tx drop: invalid da for name 0x00ee000000000000 [ 946.555179][ T1540] vcan0: tx drop: invalid da for name 0x00ee000000000000 10:00:53 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0x100000000000000}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) [ 946.735738][ T1543] vcan0: tx drop: invalid da for name 0x0100000000000000 [ 946.746068][ T1544] vcan0: tx drop: invalid da for name 0x0100000000000000 10:00:54 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x11}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:00:54 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0x200000000000000}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:00:54 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES64], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:00:54 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007000000"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) socket$netlink(0x10, 0x3, 0x0) 10:00:54 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x0, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:00:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x6000000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:00:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x7000000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 947.708342][ T1567] vcan0: tx drop: invalid da for name 0x0200000000000000 [ 947.738323][ T1569] vcan0: tx drop: invalid da for name 0x0200000000000000 [ 947.769728][ T27] audit: type=1804 audit(1585908054.948:1133): pid=1564 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/597/cgroup.controllers" dev="sda1" ino=16240 res=1 10:00:55 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0x800000000000000}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) [ 947.853662][ T27] audit: type=1804 audit(1585908054.978:1134): pid=1573 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/672/cgroup.controllers" dev="sda1" ino=16242 res=1 [ 947.876951][ T1579] vcan0: tx drop: invalid da for name 0x0800000000000000 [ 947.899305][ T1565] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 947.900701][ T1582] vcan0: tx drop: invalid da for name 0x0800000000000000 [ 947.922489][ T1581] dccp_invalid_packet: P.Data Offset(103) too large 10:00:55 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x0, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:00:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x8010000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:00:55 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0x1100000000000000}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:00:55 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0x19c77883da000000}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) [ 948.156372][ T1589] vcan0: tx drop: invalid da for name 0x1100000000000000 [ 948.177293][ T1594] vcan0: tx drop: invalid da for name 0x1100000000000000 [ 948.271546][ T1596] vcan0: tx drop: invalid da for name 0x19c77883da000000 [ 948.287879][ T1597] vcan0: tx drop: invalid da for name 0x19c77883da000000 10:00:56 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x21}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:00:56 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007000000"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) socket$netlink(0x10, 0x3, 0x0) 10:00:56 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0x3f00000000000000}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:00:56 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c0001000000", @ANYRES64], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:00:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0xe020000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:00:56 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x0, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 948.943945][ T1616] vcan0: tx drop: invalid da for name 0x3f00000000000000 [ 948.967304][ T1618] vcan0: tx drop: invalid da for name 0x3f00000000000000 10:00:56 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0xfdffffff00000000}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) [ 949.027696][ T27] audit: type=1804 audit(1585908056.198:1135): pid=1617 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/598/cgroup.controllers" dev="sda1" ino=16252 res=1 [ 949.084206][ T27] audit: type=1804 audit(1585908056.258:1136): pid=1624 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/673/cgroup.controllers" dev="sda1" ino=16257 res=1 [ 949.114928][ T1617] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 949.126013][ T1640] vcan0: tx drop: invalid da for name 0xfdffffff00000000 10:00:56 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 949.136311][ T1643] vcan0: tx drop: invalid da for name 0xfdffffff00000000 [ 949.144761][ T1624] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:00:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x12010000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:00:56 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0xffef000000000000}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) [ 949.378767][ T1649] vcan0: tx drop: invalid da for name 0xffef000000000000 [ 949.421157][ T1652] vcan0: tx drop: invalid da for name 0xffef000000000000 10:00:56 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0xffff030000000000}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:00:56 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c0001000000", @ANYRES64], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 949.646605][ T1655] vcan0: tx drop: invalid da for name 0xffff030000000000 [ 949.696741][ T1658] vcan0: tx drop: invalid da for name 0xffff030000000000 [ 949.764169][ T27] audit: type=1804 audit(1585908056.938:1137): pid=1657 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/599/cgroup.controllers" dev="sda1" ino=16254 res=1 [ 950.059052][ T1657] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:00:57 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x48}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:00:57 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0xffffff7f00000000}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:00:57 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007000000"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:00:57 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:00:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x14010000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:00:57 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c0001000000", @ANYRES64], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:00:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x1c030000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 950.675290][ T1682] vcan0: tx drop: invalid da for name 0xffffff7f00000000 10:00:57 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0xffffffff00000000}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) [ 950.756717][ T27] audit: type=1804 audit(1585908057.928:1138): pid=1683 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/600/cgroup.controllers" dev="sda1" ino=16260 res=1 [ 950.814660][ T27] audit: type=1804 audit(1585908057.958:1139): pid=1685 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/674/cgroup.controllers" dev="sda1" ino=16262 res=1 [ 950.827377][ T1696] vcan0: tx drop: invalid da for name 0xffffffff00000000 [ 950.854463][ T1698] vcan0: tx drop: invalid da for name 0xffffffff00000000 10:00:58 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:00:58 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 950.885050][ T1683] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 950.918404][ T1685] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:00:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x20000000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:00:58 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0x0, {0x2}}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:00:59 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x4c}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:00:59 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0x0, {0x8}}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:00:59 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c00010000000000000000", @ANYRES64], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:00:59 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007000000"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:00:59 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x50}}, 0x0) 10:00:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x20040000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:00:59 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0x0, {0x11}}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) [ 952.017656][ T27] audit: type=1804 audit(1585908059.188:1140): pid=1733 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/675/cgroup.controllers" dev="sda1" ino=16269 res=1 10:00:59 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) [ 952.062628][ T27] audit: type=1804 audit(1585908059.238:1141): pid=1737 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/601/cgroup.controllers" dev="sda1" ino=16279 res=1 10:00:59 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0x0, {0x0, 0x2}}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:00:59 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x50}}, 0x0) [ 952.121973][ T1733] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 952.154370][ T1737] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:00:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x22030000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:00:59 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c00010000000000000000", @ANYRES64], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 952.725816][ T27] audit: type=1804 audit(1585908059.898:1142): pid=1767 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/602/cgroup.controllers" dev="sda1" ino=16279 res=1 [ 952.922922][ T1766] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:01:00 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x60}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:01:00 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007000000"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:00 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x50}}, 0x0) 10:01:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x2c010000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:00 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c00010000000000000000", @ANYRES64], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x2e020000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 953.563369][ C0] vcan0: j1939_tp_rxtimer: 0x00000000d156fce0: rx timeout, send abort [ 953.573856][ C0] vcan0: j1939_xtp_rx_abort_one: 0x00000000d156fce0: 0x00200: (3) A timeout occurred and this is the connection abort to close the session. [ 953.623387][ T27] audit: type=1804 audit(1585908060.798:1143): pid=1790 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/603/cgroup.controllers" dev="sda1" ino=16280 res=1 [ 953.650207][ T27] audit: type=1804 audit(1585908060.808:1144): pid=1789 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/676/cgroup.controllers" dev="sda1" ino=16281 res=1 10:01:00 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x60, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x60}}, 0x0) [ 953.741973][ T1790] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 953.775759][ T1789] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:01:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x32010000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:02 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0x0, {0x0, 0x8}}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:01:02 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c00010000000000000000000700", @ANYRES64], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:02 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007000000"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:02 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x60, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x60}}, 0x0) [ 954.855089][ C1] vcan0: j1939_tp_rxtimer: 0x00000000d6c45124: rx timeout, send abort [ 954.863957][ C1] vcan0: j1939_xtp_rx_abort_one: 0x00000000d6c45124: 0x00200: (3) A timeout occurred and this is the connection abort to close the session. 10:01:02 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x68}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:01:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x3c000000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x3e000000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 955.034032][ T1837] dccp_invalid_packet: P.Data Offset(103) too large [ 955.050054][ T27] audit: type=1804 audit(1585908062.228:1145): pid=1838 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/677/cgroup.controllers" dev="sda1" ino=16295 res=1 [ 955.075732][ T27] audit: type=1804 audit(1585908062.248:1146): pid=1840 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/604/cgroup.controllers" dev="sda1" ino=16297 res=1 10:01:02 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x60, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x60}}, 0x0) 10:01:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x3e020000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 955.170097][ T1840] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:01:02 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007000000"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 955.444170][ T27] audit: type=1804 audit(1585908062.618:1147): pid=1848 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/678/cgroup.controllers" dev="sda1" ino=16295 res=1 10:01:02 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c0001000000000000000000", @ANYRES64], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 955.834380][ T1854] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:01:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x3f000000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 956.247636][ C1] vcan0: j1939_tp_rxtimer: 0x00000000d8c3edff: rx timeout, send abort [ 956.256317][ C1] vcan0: j1939_xtp_rx_abort_one: 0x00000000d8c3edff: 0x00800: (3) A timeout occurred and this is the connection abort to close the session. 10:01:04 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0x0, {0x0, 0x11}}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:01:04 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:04 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007000000"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x40000000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:04 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c0001000000000000000000", @ANYRES64], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:04 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x6c}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) [ 957.524004][ C1] vcan0: j1939_tp_rxtimer: 0x000000008210fea4: rx timeout, send abort [ 957.533273][ C1] vcan0: j1939_xtp_rx_abort_one: 0x000000008210fea4: 0x00800: (3) A timeout occurred and this is the connection abort to close the session. [ 957.695031][ T27] kauditd_printk_skb: 1 callbacks suppressed [ 957.695044][ T27] audit: type=1804 audit(1585908064.868:1149): pid=1894 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/679/cgroup.controllers" dev="sda1" ino=16314 res=1 [ 957.727451][ T27] audit: type=1804 audit(1585908064.878:1150): pid=1882 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/606/cgroup.controllers" dev="sda1" ino=16313 res=1 10:01:05 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007000000"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x48000000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 957.841088][ T1882] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:01:05 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:05 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c0001000000000000000000", @ANYRES64], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:05 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x4a000000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 958.563546][ T27] audit: type=1804 audit(1585908065.739:1151): pid=1927 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/607/cgroup.controllers" dev="sda1" ino=15712 res=1 [ 958.694466][ T1927] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 958.882675][ C0] vcan0: j1939_tp_rxtimer: 0x0000000003d49101: rx timeout, send abort [ 958.892109][ C0] vcan0: j1939_xtp_rx_abort_one: 0x0000000003d49101: 0x01100: (3) A timeout occurred and this is the connection abort to close the session. 10:01:07 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:07 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:01:07 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007000000"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x4c000000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:07 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x74}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:01:07 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 960.160442][ C0] vcan0: j1939_tp_rxtimer: 0x000000004bb67b00: rx timeout, send abort [ 960.168862][ C0] vcan0: j1939_xtp_rx_abort_one: 0x000000004bb67b00: 0x01100: (3) A timeout occurred and this is the connection abort to close the session. 10:01:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x50020000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:07 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0x0, {0x0, 0x0, 0x2}}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) [ 960.348915][ T27] audit: type=1804 audit(1585908067.529:1152): pid=1955 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/608/cgroup.controllers" dev="sda1" ino=16325 res=1 10:01:07 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:07 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007000000"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 960.458428][ T1955] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:01:08 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c0001000000000000000000", @ANYRES64], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x58010000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 961.008567][ T27] audit: type=1804 audit(1585908068.179:1153): pid=1986 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/609/cgroup.controllers" dev="sda1" ino=16318 res=1 10:01:08 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 961.091168][ T1986] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:01:08 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007000000"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x5c000000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 961.359710][ T27] audit: type=1804 audit(1585908068.539:1154): pid=2003 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/683/cgroup.controllers" dev="sda1" ino=16326 res=1 10:01:08 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c0001000000000000000000", @ANYRES64], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 961.635181][ T27] audit: type=1804 audit(1585908068.809:1155): pid=2006 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/610/cgroup.controllers" dev="sda1" ino=16318 res=1 [ 961.659921][ C1] vcan0: j1939_tp_rxtimer: 0x00000000ace9b12f: rx timeout, send abort [ 961.668435][ C1] vcan0: j1939_xtp_rx_abort_one: 0x00000000ace9b12f: 0x20000: (3) A timeout occurred and this is the connection abort to close the session. [ 961.799874][ T2003] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 961.820067][ T2006] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:01:09 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x7a}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:01:09 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x60, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x60}}, 0x0) 10:01:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x60000000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 962.645537][ T2025] dccp_invalid_packet: P.Data Offset(103) too large 10:01:10 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:01:10 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007000000"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x60020000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:10 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x60, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x60}}, 0x0) 10:01:10 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c0001000000000000000000", @ANYRES64], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:10 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) [ 962.938046][ C0] vcan0: j1939_tp_rxtimer: 0x00000000b5b56194: rx timeout, send abort [ 962.946509][ C0] vcan0: j1939_xtp_rx_abort_one: 0x00000000b5b56194: 0x20000: (3) A timeout occurred and this is the connection abort to close the session. [ 963.089824][ T27] audit: type=1804 audit(1585908070.269:1156): pid=2043 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/684/cgroup.controllers" dev="sda1" ino=16333 res=1 [ 963.116987][ T27] audit: type=1804 audit(1585908070.269:1157): pid=2044 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/611/cgroup.controllers" dev="sda1" ino=16337 res=1 10:01:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x60030000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 963.279257][ T2043] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 963.293047][ T2044] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:01:10 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x60, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x60}}, 0x0) 10:01:10 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007000000"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:10 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 963.906338][ T27] audit: type=1804 audit(1585908071.079:1158): pid=2071 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/612/cgroup.controllers" dev="sda1" ino=16119 res=1 10:01:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x68000000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:11 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 964.068225][ T2071] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 964.295014][ C0] vcan0: j1939_tp_rxtimer: 0x00000000786736f4: rx timeout, send abort [ 964.303759][ C0] vcan0: j1939_xtp_rx_abort_one: 0x00000000786736f4: 0x40000: (3) A timeout occurred and this is the connection abort to close the session. [ 964.337864][ T27] audit: type=1804 audit(1585908071.509:1159): pid=2068 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/685/cgroup.controllers" dev="sda1" ino=16333 res=1 [ 965.109325][ T0] NOHZ: local_softirq_pending 08 10:01:12 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0x0, {0x0, 0x0, 0x11}}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:01:12 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007000000"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:12 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x2}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:01:12 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x68030000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:12 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 965.577482][ C0] vcan0: j1939_tp_rxtimer: 0x00000000e92ffacc: rx timeout, send abort [ 965.585832][ C0] vcan0: j1939_xtp_rx_abort_one: 0x00000000e92ffacc: 0x40000: (3) A timeout occurred and this is the connection abort to close the session. 10:01:13 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:13 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x6c000000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:13 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007000000"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 966.119233][ T27] audit: type=1804 audit(1585908073.299:1160): pid=2107 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/686/cgroup.controllers" dev="sda1" ino=16347 res=1 10:01:13 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x70000000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 966.867028][ T27] audit: type=1804 audit(1585908074.039:1161): pid=2129 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/687/cgroup.controllers" dev="sda1" ino=16347 res=1 [ 966.963869][ C1] vcan0: j1939_tp_rxtimer: 0x00000000cf175a33: rx timeout, send abort [ 966.972454][ C1] vcan0: j1939_xtp_rx_abort_one: 0x00000000cf175a33: 0x40000: (3) A timeout occurred and this is the connection abort to close the session. 10:01:15 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:01:15 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:15 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x74000000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:15 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007000000"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:15 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x3}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) [ 968.259378][ C1] vcan0: j1939_tp_rxtimer: 0x000000002cc401c3: rx timeout, send abort [ 968.267808][ C1] vcan0: j1939_xtp_rx_abort_one: 0x000000002cc401c3: 0x40000: (3) A timeout occurred and this is the connection abort to close the session. 10:01:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x74020000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:15 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007000000"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:15 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:15 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x2}}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:01:15 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:15 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:15 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007000000"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:15 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:16 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007000000"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r1, r0, 0x0, 0x100000001) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:16 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x7a000000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:16 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x4}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:01:16 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:16 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x7c010000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 969.875527][ C0] vcan0: j1939_tp_rxtimer: 0x0000000074c447b1: rx timeout, send abort [ 969.886885][ C0] vcan0: j1939_xtp_rx_abort_one: 0x0000000074c447b1: 0x40000: (3) A timeout occurred and this is the connection abort to close the session. 10:01:18 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x8}}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:01:18 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007000000"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r1, r0, 0x0, 0x100000001) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:18 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x80ffffff, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:18 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x64, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x3c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x2c, 0x2, 0x0, 0x1, [@IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x64}}, 0x0) 10:01:18 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x5}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) [ 971.162912][ C1] vcan0: j1939_tp_rxtimer: 0x000000001c40f810: rx timeout, send abort [ 971.171487][ C1] vcan0: j1939_xtp_rx_abort_one: 0x000000001c40f810: 0x40000: (3) A timeout occurred and this is the connection abort to close the session. 10:01:18 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:18 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007000000"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r1, r0, 0x0, 0x100000001) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x88000000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:18 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x64, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x3c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x2c, 0x2, 0x0, 0x1, [@IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x64}}, 0x0) 10:01:18 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:19 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 972.295620][ T27] audit: type=1804 audit(1585908079.469:1162): pid=2277 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/625/cgroup.controllers" dev="sda1" ino=16401 res=1 [ 972.537711][ C0] vcan0: j1939_tp_rxtimer: 0x000000002f5bcf03: rx timeout, send abort [ 972.546564][ C0] vcan0: j1939_xtp_rx_abort_one: 0x000000002f5bcf03: 0x40000: (3) A timeout occurred and this is the connection abort to close the session. 10:01:21 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x11}}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:01:21 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:21 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x64, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x3c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x2c, 0x2, 0x0, 0x1, [@IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x64}}, 0x0) 10:01:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x8a020000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:21 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:21 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x6}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) [ 973.814003][ C1] vcan0: j1939_tp_rxtimer: 0x0000000030c0ad39: rx timeout, send abort [ 973.822518][ C1] vcan0: j1939_xtp_rx_abort_one: 0x0000000030c0ad39: 0x40000: (3) A timeout occurred and this is the connection abort to close the session. 10:01:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x94000000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 973.964895][ T27] audit: type=1804 audit(1585908081.139:1163): pid=2297 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/694/cgroup.controllers" dev="sda1" ino=15969 res=1 10:01:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x98000000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:21 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0x0, {0x2}}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:01:21 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:21 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0xfffffffd}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) [ 974.444998][ T2325] vcan0: tx drop: invalid da for name 0x00000000fffffffd [ 974.489001][ T27] audit: type=1804 audit(1585908081.669:1164): pid=2323 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/695/cgroup.controllers" dev="sda1" ino=15825 res=1 10:01:21 executing program 2 (fault-call:3 fault-nth:0): r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 974.652430][ T2329] FAULT_INJECTION: forcing a failure. [ 974.652430][ T2329] name failslab, interval 1, probability 0, space 0, times 0 [ 974.694386][ T27] audit: type=1800 audit(1585908081.869:1165): pid=2306 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="cgroup.controllers" dev="sda1" ino=15985 res=0 [ 974.695660][ T2329] CPU: 1 PID: 2329 Comm: syz-executor.2 Not tainted 5.6.0-syzkaller #0 [ 974.722765][ T2329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 974.732925][ T2329] Call Trace: [ 974.736237][ T2329] dump_stack+0x188/0x20d [ 974.740705][ T2329] should_fail.cold+0x5/0xa [ 974.745235][ T2329] ? lock_downgrade+0x840/0x840 [ 974.750196][ T2329] ? fault_create_debugfs_attr+0x140/0x140 [ 974.756187][ T2329] should_failslab+0x5/0xf [ 974.760750][ T2329] kmem_cache_alloc_node+0x25c/0x760 [ 974.766069][ T2329] __alloc_skb+0xba/0x5a0 [ 974.770428][ T2329] ? __kmalloc_reserve.isra.0+0xe0/0xe0 [ 974.776246][ T2329] ? netlink_autobind.isra.0+0x21b/0x300 [ 974.782135][ T2329] netlink_sendmsg+0x97b/0xe10 [ 974.787102][ T2329] ? aa_af_perm+0x260/0x260 [ 974.791960][ T2329] ? netlink_unicast+0x740/0x740 [ 974.796928][ T2329] ? netlink_unicast+0x740/0x740 [ 974.802090][ T2329] sock_sendmsg+0xcf/0x120 [ 974.806626][ T2329] ____sys_sendmsg+0x6bf/0x7e0 [ 974.811420][ T2329] ? kernel_sendmsg+0x50/0x50 [ 974.816240][ T2329] ? _parse_integer+0x180/0x180 [ 974.821135][ T2329] ___sys_sendmsg+0x100/0x170 [ 974.825835][ T2329] ? sendmsg_copy_msghdr+0x70/0x70 [ 974.831379][ T2329] ? __fget_files+0x32f/0x500 [ 974.836223][ T2329] ? ksys_dup3+0x3c0/0x3c0 [ 974.840676][ T2329] ? __fget_light+0x20e/0x270 [ 974.845501][ T2329] __sys_sendmsg+0xec/0x1b0 [ 974.850316][ T2329] ? __sys_sendmsg_sock+0xb0/0xb0 [ 974.855488][ T2329] ? vfs_write+0x161/0x5d0 [ 974.860029][ T2329] ? trace_hardirqs_off_caller+0x55/0x230 [ 974.865773][ T2329] ? do_syscall_64+0x21/0x7d0 [ 974.870872][ T2329] do_syscall_64+0xf6/0x7d0 [ 974.875403][ T2329] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 974.881509][ T2329] RIP: 0033:0x45c849 [ 974.885421][ T2329] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 974.905860][ T2329] RSP: 002b:00007fb5ad526c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 974.914549][ T2329] RAX: ffffffffffffffda RBX: 00007fb5ad5276d4 RCX: 000000000045c849 [ 974.922734][ T2329] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000004 [ 974.930862][ T2329] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 974.939054][ T2329] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 974.947185][ T2329] R13: 00000000000009fc R14: 00000000004ccb3c R15: 0000000000000000 [ 975.196712][ C1] vcan0: j1939_tp_rxtimer: 0x00000000495662d8: rx timeout, send abort [ 975.205262][ C1] vcan0: j1939_xtp_rx_abort_one: 0x00000000495662d8: 0x40000: (3) A timeout occurred and this is the connection abort to close the session. 10:01:23 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:01:23 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x9e030000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:23 executing program 2 (fault-call:3 fault-nth:1): r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:23 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x7}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) [ 976.473408][ C1] vcan0: j1939_tp_rxtimer: 0x00000000ce092385: rx timeout, send abort [ 976.481859][ C1] vcan0: j1939_xtp_rx_abort_one: 0x00000000ce092385: 0x40000: (3) A timeout occurred and this is the connection abort to close the session. [ 976.575820][ T2348] FAULT_INJECTION: forcing a failure. [ 976.575820][ T2348] name failslab, interval 1, probability 0, space 0, times 0 10:01:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0xa8010000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 976.641697][ T2348] CPU: 1 PID: 2348 Comm: syz-executor.2 Not tainted 5.6.0-syzkaller #0 [ 976.650006][ T2348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 976.660068][ T2348] Call Trace: [ 976.663381][ T2348] dump_stack+0x188/0x20d [ 976.667732][ T2348] should_fail.cold+0x5/0xa [ 976.672255][ T2348] ? lock_downgrade+0x840/0x840 [ 976.677119][ T2348] ? fault_create_debugfs_attr+0x140/0x140 [ 976.682954][ T2348] should_failslab+0x5/0xf [ 976.687512][ T2348] kmem_cache_alloc_node_trace+0x27c/0x790 [ 976.693373][ T2348] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 976.699377][ T2348] __kmalloc_node_track_caller+0x38/0x60 [ 976.705197][ T2348] __kmalloc_reserve.isra.0+0x39/0xe0 [ 976.710591][ T2348] __alloc_skb+0xef/0x5a0 [ 976.714944][ T2348] ? __kmalloc_reserve.isra.0+0xe0/0xe0 [ 976.720507][ T2348] ? netlink_autobind.isra.0+0x21b/0x300 [ 976.726267][ T2348] netlink_sendmsg+0x97b/0xe10 [ 976.731062][ T2348] ? aa_af_perm+0x260/0x260 [ 976.735575][ T2348] ? netlink_unicast+0x740/0x740 [ 976.740530][ T2348] ? netlink_unicast+0x740/0x740 [ 976.745478][ T2348] sock_sendmsg+0xcf/0x120 [ 976.749909][ T2348] ____sys_sendmsg+0x6bf/0x7e0 [ 976.754698][ T2348] ? kernel_sendmsg+0x50/0x50 [ 976.759390][ T2348] ? _parse_integer+0x180/0x180 [ 976.764263][ T2348] ___sys_sendmsg+0x100/0x170 [ 976.768951][ T2348] ? sendmsg_copy_msghdr+0x70/0x70 [ 976.774090][ T2348] ? __fget_files+0x32f/0x500 [ 976.778792][ T2348] ? ksys_dup3+0x3c0/0x3c0 [ 976.783223][ T2348] ? __fget_light+0x20e/0x270 [ 976.787911][ T2348] __sys_sendmsg+0xec/0x1b0 [ 976.792421][ T2348] ? __sys_sendmsg_sock+0xb0/0xb0 [ 976.797449][ T2348] ? vfs_write+0x161/0x5d0 [ 976.801880][ T2348] ? trace_hardirqs_off_caller+0x55/0x230 [ 976.807605][ T2348] ? do_syscall_64+0x21/0x7d0 [ 976.812294][ T2348] do_syscall_64+0xf6/0x7d0 [ 976.816808][ T2348] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 976.820408][ T27] audit: type=1804 audit(1585908083.999:1166): pid=2355 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/696/cgroup.controllers" dev="sda1" ino=16273 res=1 [ 976.822697][ T2348] RIP: 0033:0x45c849 [ 976.822718][ T2348] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 976.871653][ T2348] RSP: 002b:00007fb5ad526c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 976.880083][ T2348] RAX: ffffffffffffffda RBX: 00007fb5ad5276d4 RCX: 000000000045c849 [ 976.888069][ T2348] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000004 [ 976.896048][ T2348] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 976.904148][ T2348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 976.912140][ T2348] R13: 00000000000009fc R14: 00000000004ccb3c R15: 0000000000000001 10:01:24 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0x0, {}, 0x2}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) [ 977.229403][ T27] audit: type=1804 audit(1585908084.409:1167): pid=2354 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/627/cgroup.controllers" dev="sda1" ino=16193 res=1 10:01:24 executing program 2 (fault-call:3 fault-nth:2): r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0xb6020000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:24 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:24 executing program 5: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 977.432009][ T2369] FAULT_INJECTION: forcing a failure. [ 977.432009][ T2369] name failslab, interval 1, probability 0, space 0, times 0 [ 977.464655][ T2369] CPU: 1 PID: 2369 Comm: syz-executor.2 Not tainted 5.6.0-syzkaller #0 [ 977.473063][ T2369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 977.483125][ T2369] Call Trace: [ 977.486434][ T2369] dump_stack+0x188/0x20d [ 977.490786][ T2369] should_fail.cold+0x5/0xa [ 977.495304][ T2369] ? fault_create_debugfs_attr+0x140/0x140 [ 977.501133][ T2369] should_failslab+0x5/0xf [ 977.505560][ T2369] kmem_cache_alloc_trace+0x2d0/0x7d0 [ 977.510957][ T2369] rtnl_newlink+0x46/0xa0 [ 977.515298][ T2369] ? __rtnl_newlink+0x1590/0x1590 [ 977.520333][ T2369] rtnetlink_rcv_msg+0x44e/0xad0 [ 977.525282][ T2369] ? rtnl_bridge_getlink+0x870/0x870 [ 977.530580][ T2369] ? lock_acquire+0x1f2/0x8f0 [ 977.535261][ T2369] ? netlink_deliver_tap+0x146/0xb50 [ 977.540561][ T2369] netlink_rcv_skb+0x15a/0x410 [ 977.545335][ T2369] ? rtnl_bridge_getlink+0x870/0x870 [ 977.550625][ T2369] ? netlink_ack+0xa10/0xa10 [ 977.555235][ T2369] netlink_unicast+0x537/0x740 [ 977.560016][ T2369] ? netlink_attachskb+0x810/0x810 [ 977.565146][ T2369] ? _copy_from_iter_full+0x25c/0x870 [ 977.570540][ T2369] ? __phys_addr_symbol+0x2c/0x70 [ 977.575576][ T2369] ? __check_object_size+0x171/0x437 [ 977.580873][ T2369] netlink_sendmsg+0x882/0xe10 [ 977.585655][ T2369] ? aa_af_perm+0x260/0x260 [ 977.590172][ T2369] ? netlink_unicast+0x740/0x740 [ 977.595135][ T2369] ? netlink_unicast+0x740/0x740 [ 977.600092][ T2369] sock_sendmsg+0xcf/0x120 [ 977.604522][ T2369] ____sys_sendmsg+0x6bf/0x7e0 [ 977.609301][ T2369] ? kernel_sendmsg+0x50/0x50 [ 977.613990][ T2369] ? _parse_integer+0x180/0x180 [ 977.618860][ T2369] ___sys_sendmsg+0x100/0x170 [ 977.623552][ T2369] ? sendmsg_copy_msghdr+0x70/0x70 [ 977.629741][ T2369] ? __fget_files+0x32f/0x500 [ 977.634433][ T2369] ? ksys_dup3+0x3c0/0x3c0 [ 977.638871][ T2369] ? __fget_light+0x20e/0x270 [ 977.643564][ T2369] __sys_sendmsg+0xec/0x1b0 [ 977.648075][ T2369] ? __sys_sendmsg_sock+0xb0/0xb0 [ 977.653106][ T2369] ? vfs_write+0x161/0x5d0 [ 977.657659][ T2369] ? trace_hardirqs_off_caller+0x55/0x230 [ 977.663402][ T2369] ? do_syscall_64+0x21/0x7d0 [ 977.668250][ T2369] do_syscall_64+0xf6/0x7d0 [ 977.672769][ T2369] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 977.678669][ T2369] RIP: 0033:0x45c849 [ 977.682576][ T2369] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 977.702186][ T2369] RSP: 002b:00007fb5ad526c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 977.710610][ T2369] RAX: ffffffffffffffda RBX: 00007fb5ad5276d4 RCX: 000000000045c849 [ 977.718596][ T2369] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000004 [ 977.726587][ T2369] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 977.734601][ T2369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 977.742756][ T2369] R13: 00000000000009fc R14: 00000000004ccb3c R15: 0000000000000002 [ 977.751740][ T27] audit: type=1804 audit(1585908084.819:1168): pid=2374 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/697/cgroup.controllers" dev="sda1" ino=16273 res=1 10:01:25 executing program 2 (fault-call:3 fault-nth:3): r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 977.975953][ T2384] FAULT_INJECTION: forcing a failure. [ 977.975953][ T2384] name failslab, interval 1, probability 0, space 0, times 0 [ 977.989236][ T2384] CPU: 0 PID: 2384 Comm: syz-executor.2 Not tainted 5.6.0-syzkaller #0 [ 977.997487][ T2384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 978.007546][ T2384] Call Trace: [ 978.010848][ T2384] dump_stack+0x188/0x20d [ 978.015202][ T2384] should_fail.cold+0x5/0xa [ 978.019732][ T2384] ? fault_create_debugfs_attr+0x140/0x140 [ 978.025565][ T2384] should_failslab+0x5/0xf [ 978.030002][ T2384] kmem_cache_alloc_node_trace+0x27c/0x790 [ 978.035821][ T2384] ? apparmor_capable+0x454/0x8a0 [ 978.040963][ T2384] ? apparmor_capable+0x454/0x8a0 [ 978.046097][ T2384] ? pointer+0x680/0x680 [ 978.050359][ T2384] ? apparmor_cred_prepare+0x750/0x750 [ 978.055842][ T2384] __kmalloc_node+0x38/0x60 [ 978.060362][ T2384] kvmalloc_node+0x61/0xf0 [ 978.064810][ T2384] alloc_netdev_mqs+0x97/0xde0 [ 978.069582][ T2384] ? vlan_dev_inherit_address+0x1f0/0x1f0 [ 978.075321][ T2384] rtnl_create_link+0x219/0xac0 [ 978.080192][ T2384] __rtnl_newlink+0xe2e/0x1590 [ 978.084983][ T2384] ? rtnl_link_unregister+0x240/0x240 [ 978.090368][ T2384] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 978.096453][ T2384] ? is_bpf_text_address+0xcb/0x160 [ 978.101671][ T2384] ? kernel_text_address+0x6e/0xe0 [ 978.106794][ T2384] ? __kernel_text_address+0x9/0x30 [ 978.112003][ T2384] ? unwind_get_return_address+0x5a/0xa0 [ 978.117642][ T2384] ? profile_setup.cold+0xc1/0xc1 [ 978.122689][ T2384] ? arch_stack_walk+0x84/0xd0 [ 978.127472][ T2384] ? stack_trace_save+0x8c/0xc0 [ 978.132334][ T2384] ? stack_trace_consume_entry+0x160/0x160 [ 978.138197][ T2384] ? rtnl_newlink+0x46/0xa0 [ 978.142738][ T2384] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 978.148813][ T2384] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 978.154800][ T2384] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 978.160629][ T2384] rtnl_newlink+0x64/0xa0 [ 978.164976][ T2384] ? __rtnl_newlink+0x1590/0x1590 [ 978.170015][ T2384] rtnetlink_rcv_msg+0x44e/0xad0 [ 978.174964][ T2384] ? rtnl_bridge_getlink+0x870/0x870 [ 978.180258][ T2384] ? lock_acquire+0x1f2/0x8f0 [ 978.184938][ T2384] ? netlink_deliver_tap+0x146/0xb50 [ 978.190251][ T2384] netlink_rcv_skb+0x15a/0x410 [ 978.195024][ T2384] ? rtnl_bridge_getlink+0x870/0x870 [ 978.200335][ T2384] ? netlink_ack+0xa10/0xa10 [ 978.204951][ T2384] netlink_unicast+0x537/0x740 [ 978.209730][ T2384] ? netlink_attachskb+0x810/0x810 [ 978.214856][ T2384] ? _copy_from_iter_full+0x25c/0x870 [ 978.220240][ T2384] ? __phys_addr_symbol+0x2c/0x70 [ 978.225269][ T2384] ? __check_object_size+0x171/0x437 [ 978.230564][ T2384] netlink_sendmsg+0x882/0xe10 [ 978.235347][ T2384] ? aa_af_perm+0x260/0x260 [ 978.239854][ T2384] ? netlink_unicast+0x740/0x740 [ 978.244793][ T2384] ? netlink_unicast+0x740/0x740 [ 978.248105][ T27] audit: type=1804 audit(1585908085.170:1169): pid=2378 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/628/cgroup.controllers" dev="sda1" ino=16353 res=1 [ 978.249741][ T2384] sock_sendmsg+0xcf/0x120 [ 978.278379][ T2384] ____sys_sendmsg+0x6bf/0x7e0 [ 978.283163][ T2384] ? kernel_sendmsg+0x50/0x50 [ 978.287854][ T2384] ? _parse_integer+0x180/0x180 [ 978.292728][ T2384] ___sys_sendmsg+0x100/0x170 [ 978.297421][ T2384] ? sendmsg_copy_msghdr+0x70/0x70 [ 978.302530][ T2384] ? __fget_files+0x32f/0x500 [ 978.307209][ T2384] ? ksys_dup3+0x3c0/0x3c0 [ 978.311612][ T2384] ? __fget_light+0x20e/0x270 [ 978.316269][ T2384] __sys_sendmsg+0xec/0x1b0 [ 978.320749][ T2384] ? __sys_sendmsg_sock+0xb0/0xb0 [ 978.325765][ T2384] ? vfs_write+0x161/0x5d0 [ 978.330167][ T2384] ? trace_hardirqs_off_caller+0x55/0x230 [ 978.335979][ T2384] ? do_syscall_64+0x21/0x7d0 [ 978.340644][ T2384] do_syscall_64+0xf6/0x7d0 [ 978.345128][ T2384] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 978.351007][ T2384] RIP: 0033:0x45c849 [ 978.354892][ T2384] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 978.374602][ T2384] RSP: 002b:00007fb5ad526c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 978.383014][ T2384] RAX: ffffffffffffffda RBX: 00007fb5ad5276d4 RCX: 000000000045c849 [ 978.390974][ T2384] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000004 [ 978.398925][ T2384] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 978.406873][ T2384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 978.414824][ T2384] R13: 00000000000009fc R14: 00000000004ccb3c R15: 0000000000000003 10:01:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0xbe010000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:25 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x8}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:01:25 executing program 2 (fault-call:3 fault-nth:4): r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 978.423472][ C0] vcan0: j1939_tp_rxtimer: 0x00000000aee5e545: rx timeout, send abort [ 978.434173][ C0] vcan0: j1939_xtp_rx_abort_one: 0x00000000aee5e545: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. 10:01:25 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:25 executing program 5: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0xc2030000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 978.710284][ T27] audit: type=1804 audit(1585908085.890:1170): pid=2397 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/698/cgroup.controllers" dev="sda1" ino=16161 res=1 [ 979.013749][ T2395] FAULT_INJECTION: forcing a failure. [ 979.013749][ T2395] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 979.027102][ T2395] CPU: 1 PID: 2395 Comm: syz-executor.2 Not tainted 5.6.0-syzkaller #0 [ 979.035340][ T2395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 979.045499][ T2395] Call Trace: [ 979.048809][ T2395] dump_stack+0x188/0x20d [ 979.053148][ T2395] should_fail.cold+0x5/0xa [ 979.057670][ T2395] ? fault_create_debugfs_attr+0x140/0x140 [ 979.063467][ T2395] ? mark_held_locks+0xe0/0xe0 [ 979.068248][ T2395] ? __lock_acquire+0xcb5/0x4e00 [ 979.073187][ T2395] __alloc_pages_nodemask+0x17a/0x820 [ 979.078553][ T2395] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 979.084293][ T2395] ? find_held_lock+0x2d/0x110 [ 979.089057][ T2395] ? enable_ptr_key_workfn+0x30/0x30 [ 979.094339][ T2395] cache_grow_begin+0x8c/0xc30 [ 979.099204][ T2395] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 979.104661][ T2395] kmem_cache_alloc_node_trace+0x6c3/0x790 [ 979.110475][ T2395] ? pointer+0x680/0x680 [ 979.114713][ T2395] ? apparmor_cred_prepare+0x750/0x750 [ 979.120169][ T2395] __kmalloc_node+0x38/0x60 [ 979.124675][ T2395] kvmalloc_node+0x61/0xf0 [ 979.129092][ T2395] alloc_netdev_mqs+0x97/0xde0 [ 979.133862][ T2395] ? vlan_dev_inherit_address+0x1f0/0x1f0 [ 979.139587][ T2395] rtnl_create_link+0x219/0xac0 [ 979.144444][ T2395] __rtnl_newlink+0xe2e/0x1590 [ 979.149223][ T2395] ? rtnl_link_unregister+0x240/0x240 [ 979.154604][ T2395] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 979.160664][ T2395] ? is_bpf_text_address+0xcb/0x160 [ 979.165846][ T2395] ? kernel_text_address+0x6e/0xe0 [ 979.170945][ T2395] ? __kernel_text_address+0x9/0x30 [ 979.176658][ T2395] ? unwind_get_return_address+0x5a/0xa0 [ 979.182278][ T2395] ? profile_setup.cold+0xc1/0xc1 [ 979.187289][ T2395] ? arch_stack_walk+0x84/0xd0 [ 979.192051][ T2395] ? stack_trace_save+0x8c/0xc0 [ 979.196891][ T2395] ? stack_trace_consume_entry+0x160/0x160 [ 979.202720][ T2395] ? rtnl_newlink+0x46/0xa0 [ 979.207209][ T2395] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 979.212753][ T2395] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 979.218716][ T2395] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 979.224522][ T2395] rtnl_newlink+0x64/0xa0 [ 979.228839][ T2395] ? __rtnl_newlink+0x1590/0x1590 [ 979.233850][ T2395] rtnetlink_rcv_msg+0x44e/0xad0 [ 979.238777][ T2395] ? rtnl_bridge_getlink+0x870/0x870 [ 979.244059][ T2395] ? lock_acquire+0x1f2/0x8f0 [ 979.248719][ T2395] ? netlink_deliver_tap+0x146/0xb50 [ 979.254012][ T2395] netlink_rcv_skb+0x15a/0x410 [ 979.258777][ T2395] ? rtnl_bridge_getlink+0x870/0x870 [ 979.264063][ T2395] ? netlink_ack+0xa10/0xa10 [ 979.268659][ T2395] netlink_unicast+0x537/0x740 [ 979.273419][ T2395] ? netlink_attachskb+0x810/0x810 [ 979.278534][ T2395] ? _copy_from_iter_full+0x25c/0x870 [ 979.283900][ T2395] ? __phys_addr_symbol+0x2c/0x70 [ 979.288920][ T2395] ? __check_object_size+0x171/0x437 [ 979.294195][ T2395] netlink_sendmsg+0x882/0xe10 [ 979.298957][ T2395] ? aa_af_perm+0x260/0x260 [ 979.303447][ T2395] ? netlink_unicast+0x740/0x740 [ 979.308378][ T2395] ? netlink_unicast+0x740/0x740 [ 979.313314][ T2395] sock_sendmsg+0xcf/0x120 [ 979.317735][ T2395] ____sys_sendmsg+0x6bf/0x7e0 [ 979.322486][ T2395] ? kernel_sendmsg+0x50/0x50 [ 979.327164][ T2395] ? _parse_integer+0x180/0x180 [ 979.332013][ T2395] ___sys_sendmsg+0x100/0x170 [ 979.336792][ T2395] ? sendmsg_copy_msghdr+0x70/0x70 [ 979.341911][ T2395] ? __fget_files+0x32f/0x500 [ 979.346580][ T2395] ? ksys_dup3+0x3c0/0x3c0 [ 979.350990][ T2395] ? __fget_light+0x20e/0x270 [ 979.355665][ T2395] __sys_sendmsg+0xec/0x1b0 [ 979.360160][ T2395] ? __sys_sendmsg_sock+0xb0/0xb0 [ 979.365177][ T2395] ? vfs_write+0x161/0x5d0 [ 979.369587][ T2395] ? trace_hardirqs_off_caller+0x55/0x230 [ 979.375293][ T2395] ? do_syscall_64+0x21/0x7d0 [ 979.380046][ T2395] do_syscall_64+0xf6/0x7d0 [ 979.384540][ T2395] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 979.390416][ T2395] RIP: 0033:0x45c849 [ 979.394307][ T2395] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 979.414241][ T2395] RSP: 002b:00007fb5ad526c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 979.422635][ T2395] RAX: ffffffffffffffda RBX: 00007fb5ad5276d4 RCX: 000000000045c849 [ 979.430588][ T2395] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000004 [ 979.438542][ T2395] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 979.446498][ T2395] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 979.454452][ T2395] R13: 00000000000009fc R14: 00000000004ccb3c R15: 0000000000000004 [ 979.702994][ C0] vcan0: j1939_tp_rxtimer: 0x0000000058248dca: rx timeout, send abort [ 979.711621][ C0] vcan0: j1939_xtp_rx_abort_one: 0x0000000058248dca: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. 10:01:26 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0x0, {}, 0x8}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) [ 979.731993][ T27] audit: type=1804 audit(1585908086.910:1171): pid=2406 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/629/cgroup.controllers" dev="sda1" ino=16377 res=1 10:01:27 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0xc4020000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:27 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:27 executing program 5: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0xc8010000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:27 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x11}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) [ 980.098469][ T27] audit: type=1804 audit(1585908087.280:1172): pid=2425 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/699/cgroup.controllers" dev="sda1" ino=16241 res=1 10:01:27 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0xce000000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:27 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0xd6000000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 980.833554][ T27] audit: type=1804 audit(1585908088.010:1173): pid=2441 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/630/cgroup.controllers" dev="sda1" ino=16001 res=1 10:01:28 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000080)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 980.921406][ T27] audit: type=1804 audit(1585908088.040:1174): pid=2452 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/700/cgroup.controllers" dev="sda1" ino=16241 res=1 [ 981.036221][ C1] vcan0: j1939_tp_rxtimer: 0x00000000b0802974: rx timeout, send abort [ 981.044850][ C1] vcan0: j1939_xtp_rx_abort_one: 0x00000000b0802974: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 981.254438][ T27] audit: type=1804 audit(1585908088.430:1175): pid=2460 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/631/cgroup.controllers" dev="sda1" ino=16081 res=1 [ 981.355841][ T2460] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:01:29 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0x0, {}, 0x11}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:01:29 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x2, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0xe0000000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:29 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:29 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:29 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x21}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) [ 982.316356][ C0] vcan0: j1939_tp_rxtimer: 0x000000001566d102: rx timeout, send abort [ 982.324880][ C0] vcan0: j1939_xtp_rx_abort_one: 0x000000001566d102: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 982.478470][ T27] audit: type=1804 audit(1585908089.660:1176): pid=2477 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/632/cgroup.controllers" dev="sda1" ino=16433 res=1 [ 982.504733][ T27] audit: type=1804 audit(1585908089.660:1177): pid=2485 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/701/cgroup.controllers" dev="sda1" ino=16449 res=1 [ 982.603554][ T2477] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:01:29 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x3, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:30 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:30 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 983.157352][ T27] audit: type=1804 audit(1585908090.330:1178): pid=2498 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/702/cgroup.controllers" dev="sda1" ino=16449 res=1 10:01:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0xe0010000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:30 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x4, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0xe4000000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 983.698942][ C0] vcan0: j1939_tp_rxtimer: 0x00000000d2c13880: rx timeout, send abort [ 983.708507][ C0] vcan0: j1939_xtp_rx_abort_one: 0x00000000d2c13880: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. 10:01:32 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x17, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:01:32 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0xe4010000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:32 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x5, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:32 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x48}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:01:32 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200), 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 984.991054][ C0] vcan0: j1939_tp_rxtimer: 0x000000005d940284: rx timeout, send abort [ 984.999467][ C0] vcan0: j1939_xtp_rx_abort_one: 0x000000005d940284: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. 10:01:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0xe6000000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:32 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x20000b58, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) [ 985.182495][ T27] audit: type=1804 audit(1585908092.360:1179): pid=2536 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/703/cgroup.controllers" dev="sda1" ino=16689 res=1 10:01:32 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x8}}, 0x0) 10:01:32 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x6f9}}, 0x0) 10:01:32 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x6, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:32 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:32 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x6fffff9}}, 0x0) 10:01:32 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200), 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 985.725970][ C0] vcan0: j1939_xtp_rx_abort_one: 0x00000000322869a9: 0x00000: (2) System resources were needed for another task so this connection managed session was terminated. [ 985.754987][ C0] vcan0: j1939_xtp_rx_abort_one: 0x0000000019feb4f9: 0x00000: (2) System resources were needed for another task so this connection managed session was terminated. 10:01:33 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x20000289}}, 0x0) 10:01:33 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x7ffff000}}, 0x0) [ 985.891517][ T27] audit: type=1804 audit(1585908093.070:1180): pid=2574 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/704/cgroup.controllers" dev="sda1" ino=16513 res=1 10:01:33 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0xfffffdef}}, 0x0) 10:01:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0xea000000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:33 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:33 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x7, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:33 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200), 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:33 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x4c}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:01:34 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x2}, 0x0) [ 986.811664][ T27] audit: type=1804 audit(1585908093.990:1181): pid=2598 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/705/cgroup.controllers" dev="sda1" ino=16593 res=1 [ 986.837915][ T27] audit: type=1804 audit(1585908094.010:1182): pid=2608 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/636/cgroup.controllers" dev="sda1" ino=16625 res=1 10:01:34 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:34 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x8}, 0x0) 10:01:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0xf4000000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:34 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x8, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:34 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0xf}, 0x0) [ 987.240586][ T27] audit: type=1804 audit(1585908094.420:1183): pid=2625 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/637/cgroup.controllers" dev="sda1" ino=16404 res=1 10:01:34 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x300}, 0x0) 10:01:34 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0xffffff1f}, 0x0) 10:01:34 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x2}, 0x0) 10:01:34 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[]}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:34 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x8}, 0x0) [ 987.687760][ T27] audit: type=1804 audit(1585908094.870:1184): pid=2649 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/706/cgroup.controllers" dev="sda1" ino=16434 res=1 10:01:35 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x60}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:01:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0xfc010000, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:35 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x9, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:35 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:35 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x11}, 0x0) 10:01:35 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[]}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0xffff0300, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:35 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0xee}, 0x0) [ 988.511666][ T27] audit: type=1804 audit(1585908095.690:1185): pid=2673 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/638/cgroup.controllers" dev="sda1" ino=16736 res=1 [ 988.569623][ T27] audit: type=1804 audit(1585908095.750:1186): pid=2680 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/707/cgroup.controllers" dev="sda1" ino=16740 res=1 10:01:35 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x1100}, 0x0) 10:01:35 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:35 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xa, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:35 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x3f00}, 0x0) [ 988.990720][ T27] audit: type=1804 audit(1585908096.170:1187): pid=2710 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/639/cgroup.controllers" dev="sda1" ino=16741 res=1 10:01:36 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x68}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:01:36 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0xee00}, 0x0) 10:01:36 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[]}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0xffffff80, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:36 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xb, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:36 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:36 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0xefff}, 0x0) [ 989.806319][ T27] audit: type=1804 audit(1585908096.981:1188): pid=2739 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/708/cgroup.controllers" dev="sda1" ino=16740 res=1 10:01:37 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0xffef}, 0x0) [ 989.838416][ T27] audit: type=1804 audit(1585908096.991:1189): pid=2740 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/640/cgroup.controllers" dev="sda1" ino=16741 res=1 10:01:37 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x34000}, 0x0) 10:01:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0xc7, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:37 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:37 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x3ffff}, 0x0) [ 990.184318][ T2768] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 990.236253][ T27] audit: type=1804 audit(1585908097.411:1190): pid=2767 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/641/cgroup.controllers" dev="sda1" ino=16426 res=1 10:01:38 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x6c}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:01:38 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xf, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:38 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x400300}, 0x0) 10:01:38 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:38 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x240, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:38 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0xee0000}, 0x0) [ 991.060309][ T27] audit: type=1804 audit(1585908098.241:1191): pid=2786 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/709/cgroup.controllers" dev="sda1" ino=16738 res=1 [ 991.074430][ T2797] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 991.120490][ T27] audit: type=1804 audit(1585908098.301:1192): pid=2787 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/642/cgroup.controllers" dev="sda1" ino=16744 res=1 10:01:38 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:38 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x10, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:38 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x1000000}, 0x0) 10:01:38 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x2000000}, 0x0) [ 991.413825][ T27] audit: type=1804 audit(1585908098.591:1193): pid=2812 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/643/cgroup.controllers" dev="sda1" ino=16446 res=1 10:01:38 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x8000000}, 0x0) 10:01:39 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x74}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:01:39 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:39 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x11000000}, 0x0) 10:01:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x259, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:39 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x11, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:39 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:39 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x3f000000}, 0x0) [ 992.366258][ T27] audit: type=1804 audit(1585908099.541:1194): pid=2841 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/644/cgroup.controllers" dev="sda1" ino=16749 res=1 [ 992.396705][ T2852] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:01:39 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0xfdffffff}, 0x0) 10:01:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x420, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:39 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) socket$netlink(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:39 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0xffef0000}, 0x0) 10:01:39 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x12, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 992.748462][ T2876] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 993.166347][ T2875] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:01:40 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x7a}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:01:40 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0xffff0300}, 0x0) 10:01:40 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x4f0, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:40 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x13, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:40 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) socket$netlink(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 993.831190][ T2905] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 993.862321][ T27] kauditd_printk_skb: 2 callbacks suppressed 10:01:41 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0xffffff7f}, 0x0) [ 993.862334][ T27] audit: type=1804 audit(1585908101.041:1197): pid=2902 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/711/cgroup.controllers" dev="sda1" ino=16751 res=1 [ 993.929177][ T2904] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 993.974431][ T27] audit: type=1804 audit(1585908101.081:1198): pid=2908 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/646/cgroup.controllers" dev="sda1" ino=16754 res=1 10:01:41 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x14, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x2000, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:41 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0xfffffffd}, 0x0) 10:01:41 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) socket$netlink(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 994.219180][ T2923] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:01:41 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0xda8378c719}, 0x0) [ 994.467261][ T27] audit: type=1804 audit(1585908101.651:1199): pid=2930 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/647/cgroup.controllers" dev="sda1" ino=16752 res=1 [ 994.726684][ T2930] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:01:42 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:01:42 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c0001000000"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:42 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x40030000000000}, 0x0) 10:01:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0xc7, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:42 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xf0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:42 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x0, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 995.152717][ T2952] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:01:42 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0xee000000000000}, 0x0) [ 995.222620][ T2958] dccp_invalid_packet: P.Data Offset(103) too large [ 995.250857][ T27] audit: type=1804 audit(1585908102.431:1200): pid=2953 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/712/cgroup.controllers" dev="sda1" ino=16770 res=1 10:01:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x240, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 995.340014][ T27] audit: type=1804 audit(1585908102.441:1201): pid=2954 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/648/cgroup.controllers" dev="sda1" ino=16771 res=1 [ 995.374021][ T2954] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 995.397276][ T2953] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:01:42 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x100000000000000}, 0x0) 10:01:42 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x300, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 995.575743][ T2970] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:01:42 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x200000000000000}, 0x0) 10:01:42 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x0, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 995.967415][ T27] audit: type=1804 audit(1585908103.151:1202): pid=2980 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/649/cgroup.controllers" dev="sda1" ino=16753 res=1 [ 996.196974][ T2980] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:01:43 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x2}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:01:43 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c0001000000"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:43 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x800000000000000}, 0x0) 10:01:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x259, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:43 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x500, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:43 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x0, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 996.831086][ T2997] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:01:44 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x1100000000000000}, 0x0) 10:01:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x420, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 996.933951][ T27] audit: type=1804 audit(1585908104.111:1203): pid=2999 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/713/cgroup.controllers" dev="sda1" ino=16783 res=1 10:01:44 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x19c77883da000000}, 0x0) [ 996.992480][ T27] audit: type=1804 audit(1585908104.151:1204): pid=3001 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/650/cgroup.controllers" dev="sda1" ino=16784 res=1 [ 997.039821][ T2999] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 997.050613][ T3001] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 997.058313][ T3019] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:01:44 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x600, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:44 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c0001000000"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:44 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x3f00000000000000}, 0x0) [ 997.435060][ T27] audit: type=1804 audit(1585908104.611:1205): pid=3029 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/714/cgroup.controllers" dev="sda1" ino=16752 res=1 [ 997.795909][ T3029] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:01:45 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x3}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:01:45 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0xfdffffff00000000}, 0x0) 10:01:45 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, 0x0) 10:01:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x4f0, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:45 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x700, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 998.160178][ T3051] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:01:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x2000, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:45 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0xffef000000000000}, 0x0) [ 998.260675][ T27] audit: type=1804 audit(1585908105.442:1206): pid=3052 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/651/cgroup.controllers" dev="sda1" ino=16792 res=1 10:01:45 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0xffff030000000000}, 0x0) 10:01:45 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c00010000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 998.352110][ T3052] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 998.367419][ T3055] dccp_invalid_packet: P.Data Offset(103) too large [ 998.377223][ T3061] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:01:45 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x900, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:45 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, 0x0) [ 998.672778][ T3079] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 999.045773][ T3072] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 999.057112][ T3083] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:01:46 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x4}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:01:46 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0xffffff7f00000000}, 0x0) 10:01:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x2, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:46 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x92b, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:46 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c00010000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:46 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0xffffffff00000000}, 0x0) 10:01:46 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, 0x0) [ 999.555158][ T3103] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:01:46 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x2}, 0x0) [ 999.608592][ T27] kauditd_printk_skb: 2 callbacks suppressed [ 999.608613][ T27] audit: type=1804 audit(1585908106.792:1209): pid=3106 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/716/cgroup.controllers" dev="sda1" ino=16791 res=1 10:01:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x3, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 999.667919][ T3101] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:01:46 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xa00, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 999.774779][ T27] audit: type=1804 audit(1585908106.932:1210): pid=3112 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/653/cgroup.controllers" dev="sda1" ino=16782 res=1 10:01:47 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x8}, 0x0) 10:01:47 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x11}, 0x0) [ 999.948823][ T3128] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1000.139137][ T3112] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:01:47 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x5}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:01:47 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c00010000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:47 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0xee}, 0x0) 10:01:47 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)) 10:01:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x4, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:47 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xb00, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:48 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x1100}, 0x0) [ 1000.831504][ T27] audit: type=1804 audit(1585908108.012:1211): pid=3157 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/654/cgroup.controllers" dev="sda1" ino=16791 res=1 [ 1000.841475][ T3159] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1000.890659][ T27] audit: type=1804 audit(1585908108.072:1212): pid=3158 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/717/cgroup.controllers" dev="sda1" ino=16798 res=1 10:01:48 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x3f00}, 0x0) 10:01:48 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xf00, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1000.968473][ T3151] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1000.982382][ T3149] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:01:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x5, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:48 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0xee00}, 0x0) [ 1001.236070][ T3180] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:01:48 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0xefff}, 0x0) 10:01:49 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x6}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:01:49 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)) 10:01:49 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c00010000000000000000000700"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:49 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0xffef}, 0x0) 10:01:49 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xffe, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x6, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1002.289398][ T3201] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:01:49 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x34000}, 0x0) 10:01:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x7, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1002.380244][ T27] audit: type=1804 audit(1585908109.562:1213): pid=3202 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/655/cgroup.controllers" dev="sda1" ino=16803 res=1 10:01:49 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x3ffff}, 0x0) [ 1002.443177][ T27] audit: type=1804 audit(1585908109.622:1214): pid=3210 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/718/cgroup.controllers" dev="sda1" ino=16808 res=1 [ 1002.518112][ T3202] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1002.529726][ T3210] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1002.554733][ T3213] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:01:49 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x1100, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1002.575954][ T3209] dccp_invalid_packet: P.Data Offset(103) too large 10:01:49 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x400300}, 0x0) 10:01:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x3c, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1002.899347][ T3235] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:01:50 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x7}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:01:50 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0xee0000}, 0x0) 10:01:50 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c0001000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:50 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)) 10:01:50 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x1200, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x3e, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:50 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x1000000}, 0x0) [ 1003.658950][ T3257] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1003.692539][ T27] audit: type=1804 audit(1585908110.872:1215): pid=3255 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/719/cgroup.controllers" dev="sda1" ino=16808 res=1 [ 1003.723336][ T27] audit: type=1804 audit(1585908110.872:1216): pid=3251 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/656/cgroup.controllers" dev="sda1" ino=16806 res=1 10:01:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x48, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1003.761801][ T3251] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1003.784374][ T3255] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:01:51 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x1300, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:51 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x2000000}, 0x0) 10:01:51 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x8000000}, 0x0) [ 1004.025321][ T3277] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:01:51 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c0001000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1004.275244][ T27] audit: type=1804 audit(1585908111.462:1217): pid=3283 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/720/cgroup.controllers" dev="sda1" ino=16480 res=1 [ 1004.545947][ T3283] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1004.612500][ T3261] dccp_invalid_packet: P.Data Offset(103) too large 10:01:52 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x8}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:01:52 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x11000000}, 0x0) 10:01:52 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0b") 10:01:52 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x1400, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x4a, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:52 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c0001000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1005.102489][ T3300] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:01:52 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x3f000000}, 0x0) 10:01:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x4c, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1005.227229][ T27] audit: type=1804 audit(1585908112.412:1218): pid=3303 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/657/cgroup.controllers" dev="sda1" ino=16818 res=1 10:01:52 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0xfdffffff}, 0x0) [ 1005.300322][ T3305] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1005.325456][ T3303] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:01:52 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x2b09, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1005.329791][ T27] audit: type=1804 audit(1585908112.442:1219): pid=3305 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/721/cgroup.controllers" dev="sda1" ino=16819 res=1 [ 1005.360111][ T3307] dccp_invalid_packet: P.Data Offset(103) too large [ 1005.429982][ T3326] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:01:52 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0xffef0000}, 0x0) 10:01:52 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0b") [ 1005.976218][ T27] audit: type=1804 audit(1585908113.162:1220): pid=3342 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/658/cgroup.controllers" dev="sda1" ino=16491 res=1 [ 1006.034735][ T3342] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:01:53 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x11}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:01:53 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0xffff0300}, 0x0) 10:01:53 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x5c, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:53 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x3f00, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1006.331673][ T3362] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:01:53 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0xffffff7f}, 0x0) 10:01:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x60, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1006.430908][ T27] audit: type=1804 audit(1585908113.612:1221): pid=3363 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/722/cgroup.controllers" dev="sda1" ino=16821 res=1 10:01:53 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0xfffffffd}, 0x0) [ 1006.527486][ T3363] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1006.566210][ T3385] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:01:53 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x4000, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x68, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:53 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0b") 10:01:54 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0xda8378c719}, 0x0) [ 1006.962178][ T3398] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1007.033232][ T27] audit: type=1804 audit(1585908114.213:1222): pid=3399 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/659/cgroup.controllers" dev="sda1" ino=16824 res=1 [ 1007.260676][ T3399] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:01:54 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x21}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:01:54 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c0001000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:54 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x40030000000000}, 0x0) 10:01:54 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x8100, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x6c, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:54 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847") [ 1007.597457][ T3427] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:01:54 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0xee000000000000}, 0x0) [ 1007.638778][ T27] audit: type=1804 audit(1585908114.823:1223): pid=3421 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/660/cgroup.controllers" dev="sda1" ino=16820 res=1 [ 1007.692100][ T27] audit: type=1804 audit(1585908114.853:1224): pid=3425 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/723/cgroup.controllers" dev="sda1" ino=16821 res=1 10:01:54 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x100000000000000}, 0x0) 10:01:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x70, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1007.799203][ T3421] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1007.815163][ T3425] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:01:55 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xf000, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1007.843327][ T3446] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:01:55 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x200000000000000}, 0x0) 10:01:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x74, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1008.203236][ T3466] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1008.771903][ T3443] dccp_invalid_packet: P.Data Offset(103) too large 10:01:56 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x48}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:01:56 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847") 10:01:56 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x800000000000000}, 0x0) 10:01:56 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c0001000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:56 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xfe0f, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x7a, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:56 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x1100000000000000}, 0x0) [ 1009.202565][ T27] audit: type=1804 audit(1585908116.383:1225): pid=3489 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/661/cgroup.controllers" dev="sda1" ino=15857 res=1 [ 1009.204917][ T3496] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1009.253158][ T27] audit: type=1804 audit(1585908116.433:1226): pid=3498 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/724/cgroup.controllers" dev="sda1" ino=15985 res=1 10:01:56 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x19c77883da000000}, 0x0) 10:01:56 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xfeff, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1009.318718][ T3489] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1009.340376][ T3493] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:01:56 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x3f00000000000000}, 0x0) 10:01:56 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0xfdffffff00000000}, 0x0) 10:01:56 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c0001000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1009.823779][ T27] audit: type=1804 audit(1585908117.003:1227): pid=3528 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/725/cgroup.controllers" dev="sda1" ino=15745 res=1 [ 1010.024248][ T3528] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:01:57 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x4c}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:01:57 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847") 10:01:57 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0xffef000000000000}, 0x0) 10:01:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x88, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:57 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xff0f, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:57 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:57 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0xffff030000000000}, 0x0) [ 1010.412600][ T3558] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1010.455535][ T27] audit: type=1804 audit(1585908117.633:1228): pid=3556 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/662/cgroup.controllers" dev="sda1" ino=16129 res=1 10:01:57 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) [ 1010.526572][ T3556] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1010.542024][ T27] audit: type=1804 audit(1585908117.723:1229): pid=3565 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/726/cgroup.controllers" dev="sda1" ino=16113 res=1 10:01:57 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xfffe, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1010.572335][ T3565] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:01:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x94, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:57 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0xffffffff00000000}, 0x0) [ 1010.790344][ T3585] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:01:58 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:01:58 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x60}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:01:58 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a0") 10:01:58 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x0, 0x2}, 0x0) 10:01:58 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:58 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x34000, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x98, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:58 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x0, 0x8}, 0x0) [ 1011.589626][ T27] audit: type=1804 audit(1585908118.773:1230): pid=3623 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/663/cgroup.controllers" dev="sda1" ino=16017 res=1 [ 1011.617338][ T3627] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:01:58 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x0, 0x11}, 0x0) [ 1011.648092][ T27] audit: type=1804 audit(1585908118.823:1231): pid=3621 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/727/cgroup.controllers" dev="sda1" ino=16129 res=1 10:01:58 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x0, 0xee}, 0x0) [ 1011.749460][ T3617] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1011.761141][ T3621] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:01:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0xce, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:01:59 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x0, 0x1100}, 0x0) 10:01:59 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1011.930754][ T3657] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:01:59 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x68}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:01:59 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x400300, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:01:59 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x0, 0x3f00}, 0x0) 10:01:59 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a0") 10:01:59 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:01:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0xd6, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:00 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x0, 0xee00}, 0x0) [ 1012.915830][ T3685] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:00 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x0, 0xefff}, 0x0) [ 1012.942961][ T27] audit: type=1804 audit(1585908120.123:1232): pid=3686 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/664/cgroup.controllers" dev="sda1" ino=16353 res=1 10:02:00 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x0, 0xffef}, 0x0) 10:02:00 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xf0ffff, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1013.025578][ T3686] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:02:00 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:00 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x0, 0x34000}, 0x0) 10:02:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0xe0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:01 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x0, 0x3ffff}, 0x0) 10:02:01 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:01 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x1000000, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:01 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x6c}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:01 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a0") 10:02:01 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:01 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x0, 0x400300}, 0x0) [ 1014.223428][ T27] audit: type=1804 audit(1585908121.403:1233): pid=3719 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/665/cgroup.controllers" dev="sda1" ino=16481 res=1 [ 1014.230015][ T3728] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:01 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:01 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x0, 0xee0000}, 0x0) 10:02:01 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0xe4, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1014.417574][ T3719] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:02:01 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x11cfdff, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:01 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) [ 1014.557666][ T3754] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:01 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) 10:02:01 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:02 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x74}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:02 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x0, 0x8000000}, 0x0) 10:02:02 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:02 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0xe6, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:02 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x2000000, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1015.760386][ T3782] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:03 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x0, 0x11000000}, 0x0) 10:02:03 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0xea, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:03 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x0, 0x3f000000}, 0x0) [ 1015.946399][ T27] audit: type=1804 audit(1585908123.134:1234): pid=3783 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/666/cgroup.controllers" dev="sda1" ino=16481 res=1 10:02:03 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1015.988624][ T3783] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1016.012318][ T3799] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:03 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x3000000, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:04 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x7a}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0xf4, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:04 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x0, 0xfdffffff}, 0x0) 10:02:04 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:04 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x100000000000000}, 0x0) 10:02:04 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x4000000, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1016.946123][ T3829] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:04 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c0001000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:04 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x0, 0xffef0000}, 0x0) 10:02:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x108, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:04 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:04 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x5000000, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:04 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x0, 0xffff0300}, 0x0) [ 1017.259759][ T3854] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1017.313553][ T27] audit: type=1804 audit(1585908124.494:1235): pid=3843 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/668/cgroup.controllers" dev="sda1" ino=16505 res=1 [ 1017.718328][ T27] audit: type=1804 audit(1585908124.904:1236): pid=3857 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/740/cgroup.controllers" dev="sda1" ino=16522 res=1 [ 1017.854366][ T3843] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:02:05 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x300}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:05 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 10:02:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x112, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:05 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x6000000, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:05 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:05 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x1000000}, 0x0) 10:02:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x3, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:05 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) [ 1018.334930][ T3885] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1018.414544][ T3896] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x114, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:05 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x7000000, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:05 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x2) 10:02:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x2000, 0x250, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1018.668904][ T3908] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1018.804363][ T3912] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1018.947957][ T27] audit: type=1804 audit(1585908126.134:1237): pid=3887 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/741/cgroup.controllers" dev="sda1" ino=16524 res=1 10:02:06 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x500}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:06 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x8) 10:02:06 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:06 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x8000000, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x12c, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:06 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1019.650720][ T3928] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:06 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x11) 10:02:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x132, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:07 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x9000000, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:07 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0xee) [ 1019.942922][ T27] audit: type=1804 audit(1585908127.124:1238): pid=3932 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/672/cgroup.controllers" dev="sda1" ino=16529 res=1 10:02:07 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x1100) [ 1020.068726][ T3955] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:07 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x3f00) [ 1020.390922][ T27] audit: type=1804 audit(1585908127.574:1239): pid=3935 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/742/cgroup.controllers" dev="sda1" ino=16526 res=1 10:02:07 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x600}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:07 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:07 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0xee00) 10:02:07 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:07 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xa000000, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x158, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:08 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0xefff) [ 1020.868523][ T3983] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x17c, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:08 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0xffef) 10:02:08 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xb000000, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1021.123468][ T27] audit: type=1804 audit(1585908128.314:1240): pid=3985 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/673/cgroup.controllers" dev="sda1" ino=16555 res=1 10:02:08 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x34000) [ 1021.251305][ T4022] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:08 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x3ffff) [ 1021.646659][ T27] audit: type=1804 audit(1585908128.834:1241): pid=3998 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/743/cgroup.controllers" dev="sda1" ino=16554 res=1 10:02:09 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x700}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:09 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x400300) 10:02:09 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0xee00) 10:02:09 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x1a8, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:09 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xf000000, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1022.412070][ T4048] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:09 executing program 4 (fault-call:7 fault-nth:0): sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:09 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0xee0000) 10:02:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x1be, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:09 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x10000000, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1022.667223][ T27] audit: type=1804 audit(1585908129.854:1242): pid=4067 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/675/cgroup.controllers" dev="sda1" ino=16556 res=1 [ 1022.669040][ T4067] FAULT_INJECTION: forcing a failure. [ 1022.669040][ T4067] name failslab, interval 1, probability 0, space 0, times 0 [ 1022.700416][ T4075] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:09 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x1000000) [ 1022.807462][ T4067] CPU: 0 PID: 4067 Comm: syz-executor.4 Not tainted 5.6.0-syzkaller #0 [ 1022.815740][ T4067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1022.825813][ T4067] Call Trace: [ 1022.829119][ T4067] dump_stack+0x188/0x20d [ 1022.833471][ T4067] should_fail.cold+0x5/0xa [ 1022.838074][ T4067] ? lock_downgrade+0x840/0x840 [ 1022.842933][ T4067] ? fault_create_debugfs_attr+0x140/0x140 [ 1022.848869][ T4067] should_failslab+0x5/0xf [ 1022.853292][ T4067] kmem_cache_alloc_trace+0x2d0/0x7d0 [ 1022.858674][ T4067] ? aa_file_perm+0x5be/0x14d0 [ 1022.863454][ T4067] alloc_pipe_info+0x10a/0x4f0 [ 1022.868235][ T4067] splice_direct_to_actor+0x777/0x980 [ 1022.873615][ T4067] ? apparmor_path_rmdir+0x30/0x30 [ 1022.878854][ T4067] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1022.884410][ T4067] ? lock_downgrade+0x840/0x840 [ 1022.889280][ T4067] ? do_splice_to+0x160/0x160 [ 1022.893976][ T4067] ? security_file_permission+0x8a/0x380 [ 1022.899630][ T4067] do_splice_direct+0x1b4/0x280 [ 1022.904496][ T4067] ? splice_direct_to_actor+0x980/0x980 [ 1022.910053][ T4067] ? security_file_permission+0x8a/0x380 [ 1022.915697][ T4067] do_sendfile+0x555/0xc50 [ 1022.920128][ T4067] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1022.925421][ T4067] ? wait_for_completion+0x270/0x270 [ 1022.930717][ T4067] ? __sb_end_write+0x101/0x1d0 [ 1022.935573][ T4067] ? vfs_write+0x161/0x5d0 [ 1022.940000][ T4067] __x64_sys_sendfile64+0x1cc/0x210 [ 1022.945202][ T4067] ? ksys_write+0x1a5/0x250 [ 1022.949713][ T4067] ? __ia32_sys_sendfile+0x220/0x220 [ 1022.955000][ T4067] ? __ia32_sys_clock_settime+0x260/0x260 [ 1022.960982][ T4067] ? trace_hardirqs_off_caller+0x55/0x230 [ 1022.966727][ T4067] do_syscall_64+0xf6/0x7d0 [ 1022.971247][ T4067] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1022.977144][ T4067] RIP: 0033:0x45c849 [ 1022.981040][ T4067] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1023.000646][ T4067] RSP: 002b:00007fce296a1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1023.009072][ T4067] RAX: ffffffffffffffda RBX: 00007fce296a26d4 RCX: 000000000045c849 [ 1023.017057][ T4067] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 1023.025042][ T4067] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1023.033019][ T4067] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000006 [ 1023.041002][ T4067] R13: 00000000000008d4 R14: 00000000004cb786 R15: 0000000000000000 10:02:10 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x2000000) [ 1023.214687][ T27] audit: type=1804 audit(1585908130.404:1243): pid=4058 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/744/cgroup.controllers" dev="sda1" ino=16673 res=1 10:02:10 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0xe80}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:10 executing program 4 (fault-call:7 fault-nth:1): sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:10 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:10 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x8000000) 10:02:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x1c8, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:10 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x11000000, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:11 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x11000000) [ 1023.888565][ T4108] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1023.904128][ T27] audit: type=1804 audit(1585908131.094:1244): pid=4100 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/676/cgroup.controllers" dev="sda1" ino=16769 res=1 [ 1023.934391][ T4100] FAULT_INJECTION: forcing a failure. [ 1023.934391][ T4100] name failslab, interval 1, probability 0, space 0, times 0 10:02:11 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x3f000000) [ 1023.981284][ T4100] CPU: 1 PID: 4100 Comm: syz-executor.4 Not tainted 5.6.0-syzkaller #0 [ 1023.989735][ T4100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1023.999798][ T4100] Call Trace: [ 1024.003106][ T4100] dump_stack+0x188/0x20d [ 1024.007461][ T4100] should_fail.cold+0x5/0xa [ 1024.011980][ T4100] ? lock_downgrade+0x840/0x840 [ 1024.016845][ T4100] ? fault_create_debugfs_attr+0x140/0x140 [ 1024.022756][ T4100] should_failslab+0x5/0xf [ 1024.027186][ T4100] __kmalloc+0x2d9/0x7a0 10:02:11 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0xfdffffff) [ 1024.031439][ T4100] ? kmem_cache_alloc_trace+0x390/0x7d0 [ 1024.036991][ T4100] ? alloc_pipe_info+0x1e0/0x4f0 [ 1024.041948][ T4100] ? aa_file_perm+0x5be/0x14d0 [ 1024.046729][ T4100] alloc_pipe_info+0x1e0/0x4f0 [ 1024.051515][ T4100] splice_direct_to_actor+0x777/0x980 [ 1024.056906][ T4100] ? apparmor_path_rmdir+0x30/0x30 [ 1024.062036][ T4100] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1024.067599][ T4100] ? lock_downgrade+0x840/0x840 [ 1024.072489][ T4100] ? do_splice_to+0x160/0x160 [ 1024.077194][ T4100] ? security_file_permission+0x8a/0x380 [ 1024.082855][ T4100] do_splice_direct+0x1b4/0x280 [ 1024.088075][ T4100] ? splice_direct_to_actor+0x980/0x980 [ 1024.093645][ T4100] ? security_file_permission+0x8a/0x380 [ 1024.099297][ T4100] do_sendfile+0x555/0xc50 [ 1024.103740][ T4100] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1024.109038][ T4100] ? wait_for_completion+0x270/0x270 [ 1024.114344][ T4100] ? __sb_end_write+0x101/0x1d0 [ 1024.119202][ T4100] ? vfs_write+0x161/0x5d0 [ 1024.123635][ T4100] __x64_sys_sendfile64+0x1cc/0x210 10:02:11 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0xffef0000) [ 1024.128838][ T4100] ? ksys_write+0x1a5/0x250 [ 1024.133348][ T4100] ? __ia32_sys_sendfile+0x220/0x220 [ 1024.138641][ T4100] ? __ia32_sys_clock_settime+0x260/0x260 [ 1024.144374][ T4100] ? trace_hardirqs_off_caller+0x55/0x230 [ 1024.150108][ T4100] do_syscall_64+0xf6/0x7d0 [ 1024.154634][ T4100] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1024.160535][ T4100] RIP: 0033:0x45c849 10:02:11 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0xffff0300) [ 1024.164443][ T4100] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1024.184157][ T4100] RSP: 002b:00007fce296a1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1024.192584][ T4100] RAX: ffffffffffffffda RBX: 00007fce296a26d4 RCX: 000000000045c849 [ 1024.200557][ T4100] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 1024.208538][ T4100] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1024.216518][ T4100] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000006 [ 1024.224497][ T4100] R13: 00000000000008d4 R14: 00000000004cb786 R15: 0000000000000001 10:02:11 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0xffffff7f) [ 1024.600910][ T27] audit: type=1804 audit(1585908131.785:1245): pid=4106 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/745/cgroup.controllers" dev="sda1" ino=16641 res=1 10:02:12 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x1100}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:12 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x12000000, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:12 executing program 4 (fault-call:7 fault-nth:2): sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:12 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0xfffffffd) 10:02:12 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x1e0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1024.899978][ T4148] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:12 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0xda8378c719) 10:02:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x1e4, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1024.994432][ T27] audit: type=1804 audit(1585908132.185:1246): pid=4151 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/677/cgroup.controllers" dev="sda1" ino=16845 res=1 [ 1025.029371][ T4151] FAULT_INJECTION: forcing a failure. [ 1025.029371][ T4151] name failslab, interval 1, probability 0, space 0, times 0 [ 1025.077407][ T4151] CPU: 1 PID: 4151 Comm: syz-executor.4 Not tainted 5.6.0-syzkaller #0 [ 1025.085793][ T4151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1025.095857][ T4151] Call Trace: [ 1025.099164][ T4151] dump_stack+0x188/0x20d [ 1025.103529][ T4151] should_fail.cold+0x5/0xa [ 1025.108063][ T4151] ? fault_create_debugfs_attr+0x140/0x140 [ 1025.113898][ T4151] should_failslab+0x5/0xf [ 1025.118334][ T4151] kmem_cache_alloc_trace+0x2d0/0x7d0 10:02:12 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x40030000000000) [ 1025.123733][ T4151] iomap_dio_rw+0x27f/0x1140 [ 1025.128343][ T4151] ? lock_release+0x800/0x800 [ 1025.133045][ T4151] ? iomap_dio_complete+0x770/0x770 [ 1025.138267][ T4151] ? down_read+0x110/0x420 [ 1025.142824][ T4151] ? down_read_killable+0x460/0x460 [ 1025.148044][ T4151] ? ext4_file_read_iter+0x444/0x600 [ 1025.153344][ T4151] ext4_file_read_iter+0x444/0x600 [ 1025.158470][ T4151] generic_file_splice_read+0x479/0x780 [ 1025.164051][ T4151] ? fsnotify_first_mark+0x200/0x200 [ 1025.169344][ T4151] ? add_to_pipe+0x3a0/0x3a0 [ 1025.170349][ T4168] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1025.173949][ T4151] ? add_to_pipe+0x3a0/0x3a0 [ 1025.173992][ T4151] do_splice_to+0x114/0x160 [ 1025.174010][ T4151] splice_direct_to_actor+0x307/0x980 [ 1025.174027][ T4151] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1025.174049][ T4151] ? do_splice_to+0x160/0x160 [ 1025.206755][ T4151] ? security_file_permission+0x8a/0x380 [ 1025.212408][ T4151] do_splice_direct+0x1b4/0x280 [ 1025.217275][ T4151] ? splice_direct_to_actor+0x980/0x980 10:02:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x1fc, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1025.222836][ T4151] ? security_file_permission+0x8a/0x380 [ 1025.228483][ T4151] do_sendfile+0x555/0xc50 [ 1025.232923][ T4151] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1025.238353][ T4151] ? wait_for_completion+0x270/0x270 [ 1025.243655][ T4151] ? __sb_end_write+0x101/0x1d0 [ 1025.248523][ T4151] ? vfs_write+0x161/0x5d0 [ 1025.252975][ T4151] __x64_sys_sendfile64+0x1cc/0x210 [ 1025.258175][ T4151] ? ksys_write+0x1a5/0x250 [ 1025.259477][ T4173] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1025.262684][ T4151] ? __ia32_sys_sendfile+0x220/0x220 10:02:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x20e, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1025.262701][ T4151] ? __ia32_sys_clock_settime+0x260/0x260 [ 1025.262718][ T4151] ? trace_hardirqs_off_caller+0x55/0x230 [ 1025.262744][ T4151] do_syscall_64+0xf6/0x7d0 [ 1025.262763][ T4151] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1025.262782][ T4151] RIP: 0033:0x45c849 [ 1025.301834][ T4151] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1025.321443][ T4151] RSP: 002b:00007fce296a1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1025.329864][ T4151] RAX: ffffffffffffffda RBX: 00007fce296a26d4 RCX: 000000000045c849 [ 1025.337847][ T4151] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 1025.345834][ T4151] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1025.352467][ T4175] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1025.353809][ T4151] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000006 [ 1025.353819][ T4151] R13: 00000000000008d4 R14: 00000000004cb786 R15: 0000000000000002 10:02:12 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:13 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x2000}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x22e, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:13 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0xee000000000000) 10:02:13 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x13000000, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:13 executing program 4 (fault-call:7 fault-nth:3): sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:13 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1026.276420][ T4192] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x23e, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:13 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x100000000000000) [ 1026.413833][ T27] audit: type=1804 audit(1585908133.605:1247): pid=4196 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/678/cgroup.controllers" dev="sda1" ino=16865 res=1 [ 1026.440441][ T4196] FAULT_INJECTION: forcing a failure. [ 1026.440441][ T4196] name failslab, interval 1, probability 0, space 0, times 0 [ 1026.449463][ T4203] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1026.480066][ T4196] CPU: 1 PID: 4196 Comm: syz-executor.4 Not tainted 5.6.0-syzkaller #0 [ 1026.488340][ T4196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1026.498399][ T4196] Call Trace: [ 1026.501701][ T4196] dump_stack+0x188/0x20d [ 1026.506047][ T4196] should_fail.cold+0x5/0xa [ 1026.510567][ T4196] ? fault_create_debugfs_attr+0x140/0x140 [ 1026.516394][ T4196] should_failslab+0x5/0xf [ 1026.520822][ T4196] kmem_cache_alloc+0x29b/0x740 10:02:13 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x14000000, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:13 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x200000000000000) [ 1026.525684][ T4196] ? ext4_ext_index_trans_blocks+0x12f/0x160 [ 1026.532204][ T4196] ext4_init_io_end+0x23/0x170 [ 1026.536985][ T4196] ext4_writepages+0x928/0x30c0 [ 1026.541847][ T4196] ? mark_lock+0x12b/0xf10 [ 1026.546302][ T4196] ? is_bpf_text_address+0xcb/0x160 [ 1026.551516][ T4196] ? __kernel_text_address+0x9/0x30 [ 1026.556738][ T4196] ? unwind_get_return_address+0x5a/0xa0 [ 1026.562399][ T4196] ? ext4_mark_inode_dirty+0x900/0x900 [ 1026.567876][ T4196] ? profile_setup+0x172/0x320 [ 1026.572656][ T4196] ? mark_held_locks+0xe0/0xe0 10:02:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x250, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1026.577436][ T4196] ? save_stack+0x4c/0x80 [ 1026.581771][ T4196] ? save_stack+0x1a/0x80 [ 1026.586108][ T4196] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 1026.591928][ T4196] ? kmem_cache_alloc_trace+0x153/0x7d0 [ 1026.597485][ T4196] ? iomap_dio_rw+0x27f/0x1140 [ 1026.602325][ T4196] ? ext4_mark_inode_dirty+0x900/0x900 [ 1026.607799][ T4196] ? do_writepages+0xfa/0x2a0 [ 1026.612491][ T4196] do_writepages+0xfa/0x2a0 [ 1026.617010][ T4196] ? page_writeback_cpu_online+0x10/0x10 [ 1026.622658][ T4196] ? do_raw_spin_lock+0x129/0x2e0 [ 1026.627697][ T4196] ? do_raw_spin_unlock+0x171/0x260 [ 1026.632902][ T4196] ? _raw_spin_unlock+0x24/0x40 [ 1026.637770][ T4196] ? wbc_attach_and_unlock_inode+0x60a/0x9c0 [ 1026.643774][ T4196] __filemap_fdatawrite_range+0x2aa/0x390 [ 1026.649503][ T4196] ? delete_from_page_cache_batch+0xec0/0xec0 [ 1026.655593][ T4196] ? kmem_cache_alloc_trace+0x390/0x7d0 [ 1026.661163][ T4196] filemap_write_and_wait_range+0xf7/0x1e0 [ 1026.666985][ T4196] iomap_dio_rw+0x623/0x1140 [ 1026.671602][ T4196] ? iomap_dio_complete+0x770/0x770 [ 1026.676819][ T4196] ? down_read+0x110/0x420 10:02:13 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x800000000000000) [ 1026.681249][ T4196] ? down_read_killable+0x460/0x460 [ 1026.686469][ T4196] ? ext4_file_read_iter+0x444/0x600 [ 1026.691787][ T4196] ext4_file_read_iter+0x444/0x600 [ 1026.693507][ T4217] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1026.696905][ T4196] generic_file_splice_read+0x479/0x780 [ 1026.710481][ T4196] ? fsnotify_first_mark+0x200/0x200 [ 1026.715780][ T4196] ? add_to_pipe+0x3a0/0x3a0 [ 1026.720400][ T4196] ? add_to_pipe+0x3a0/0x3a0 [ 1026.725003][ T4196] do_splice_to+0x114/0x160 [ 1026.729630][ T4196] splice_direct_to_actor+0x307/0x980 [ 1026.735025][ T4196] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1026.740590][ T4196] ? do_splice_to+0x160/0x160 [ 1026.745461][ T4196] ? security_file_permission+0x8a/0x380 [ 1026.751121][ T4196] do_splice_direct+0x1b4/0x280 [ 1026.755991][ T4196] ? splice_direct_to_actor+0x980/0x980 [ 1026.761560][ T4196] ? security_file_permission+0x8a/0x380 [ 1026.767214][ T4196] do_sendfile+0x555/0xc50 [ 1026.771653][ T4196] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1026.776987][ T4196] ? wait_for_completion+0x270/0x270 [ 1026.782287][ T4196] ? __sb_end_write+0x101/0x1d0 [ 1026.787130][ T4196] ? vfs_write+0x161/0x5d0 [ 1026.791662][ T4196] __x64_sys_sendfile64+0x1cc/0x210 [ 1026.796856][ T4196] ? ksys_write+0x1a5/0x250 [ 1026.801393][ T4196] ? __ia32_sys_sendfile+0x220/0x220 [ 1026.806670][ T4196] ? __ia32_sys_clock_settime+0x260/0x260 [ 1026.812444][ T4196] ? trace_hardirqs_off_caller+0x55/0x230 [ 1026.818149][ T4196] do_syscall_64+0xf6/0x7d0 [ 1026.823047][ T4196] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1026.828970][ T4196] RIP: 0033:0x45c849 [ 1026.832856][ T4196] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1026.852566][ T4196] RSP: 002b:00007fce296a1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1026.860980][ T4196] RAX: ffffffffffffffda RBX: 00007fce296a26d4 RCX: 000000000045c849 [ 1026.868955][ T4196] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 1026.876914][ T4196] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1026.884923][ T4196] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000006 [ 1026.892882][ T4196] R13: 00000000000008d4 R14: 00000000004cb786 R15: 0000000000000003 [ 1027.065684][ T4196] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:02:14 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x2100}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:14 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x1100000000000000) 10:02:14 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:14 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x2b090000, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x260, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:14 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:14 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x19c77883da000000) [ 1027.739099][ T4244] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1027.747483][ T27] audit: type=1804 audit(1585908134.925:1248): pid=4236 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/679/cgroup.controllers" dev="sda1" ino=16863 res=1 [ 1027.796733][ T27] audit: type=1804 audit(1585908134.935:1249): pid=4245 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/749/cgroup.controllers" dev="sda1" ino=16867 res=1 10:02:15 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x3f000000, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1027.850663][ T4236] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:02:15 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x3f00000000000000) 10:02:15 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x274, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:15 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0xfdffffff00000000) [ 1028.119345][ T4265] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1028.145641][ T27] audit: type=1804 audit(1585908135.335:1250): pid=4263 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/750/cgroup.controllers" dev="sda1" ino=16871 res=1 10:02:16 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x4000}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:16 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0xffef000000000000) 10:02:16 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000002) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:16 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x40000000, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x28a, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:16 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1029.187595][ T4282] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:16 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0xffff030000000000) 10:02:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x2b6, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1029.276520][ T27] audit: type=1804 audit(1585908136.465:1251): pid=4284 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/751/cgroup.controllers" dev="sda1" ino=16884 res=1 10:02:16 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0xffffff7f00000000) [ 1029.358722][ T27] audit: type=1804 audit(1585908136.495:1252): pid=4285 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/680/cgroup.controllers" dev="sda1" ino=16887 res=1 [ 1029.396236][ T4285] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:02:16 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1029.426625][ T4302] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:16 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x81000000, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x2c4, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1029.685882][ T27] audit: type=1804 audit(1585908136.875:1253): pid=4309 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/752/cgroup.controllers" dev="sda1" ino=16875 res=1 [ 1029.744564][ T4314] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1029.755109][ T27] audit: type=1804 audit(1585908136.935:1254): pid=4291 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/680/cgroup.controllers" dev="sda1" ino=16887 res=1 [ 1029.823597][ T27] audit: type=1804 audit(1585908136.935:1255): pid=4285 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/680/cgroup.controllers" dev="sda1" ino=16887 res=1 10:02:17 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x4800}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:17 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0xffffffff00000000) 10:02:17 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000003) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:17 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x9effffff, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:17 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x300, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:17 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r1, r0, 0x0, 0x100000001) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000000)=0x1, &(0x7f0000000040)=0x4) r2 = socket$can_j1939(0x1d, 0x2, 0x7) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000140)=0xe8) sendmsg$TCPDIAG_GETSOCK(r3, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000bc0)={0x11a8, 0x12, 0x1, 0x70bd26, 0x25dfdbff, {0x11, 0x20, 0xe3, 0xa5, {0x4e24, 0x4e24, [0xfff, 0x9, 0x844f, 0x7fffffff], [0x40, 0x5, 0x0, 0x9], r4, [0x20]}, 0x3ff, 0x7}, [@INET_DIAG_REQ_BYTECODE={0x2b, 0x1, "5ebd7f69613986cf6a3978288ed31de365b66828bdc1c4590e8b17f419b33a8b26942bbfcc8006"}, @INET_DIAG_REQ_BYTECODE={0x8e, 0x1, "61bc4f38c4c2b6374bb2d446e5341754872bd51863b8390a1f401408b35e9ed8cb44514022db047b8618ac52dccb4553a0c15df6ea6ab66e30012edffa68917574e7ec3c1b26248db71046bec78e0f9a09d16a6212d7cbd0c543a00fa0f70d4045f206f02c09f86b2aa4bf7a3dd106127ca90ac8efb0ec8bb3b6cba5f2596045131c58318e305262586e"}, @INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0x99, 0x1, "f0e5d4e2fba22fe3c0e8f3da792e59fcb058b61af608fdfe5d3d98161bae9420fa2367c15b10867561996fb3e02d2d402ccc889bdf178407b6fa100f2f3d9390e64a7a941f5d075abe270d3f636adabe5a645c2229c55d0ff3b5fd3215660df447b66cddbd546999ef24f536ef35e354b309dce796f693e125f8fdd6759dfec060ca2bae78947b0966b3bdedf00b358acd2ef5b1fc"}]}, 0x11a8}, 0x1, 0x0, 0x0, 0x40800}, 0x8004) setsockopt$SO_J1939_ERRQUEUE(r2, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r2, &(0x7f0000000240)={0x1d, r5}, 0x18) sendmsg$can_j1939(r2, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r0, 0x8983, &(0x7f00000000c0)={0x1, 'batadv_slave_0\x00', {}, 0x1}) [ 1030.565423][ T27] audit: type=1804 audit(1585908137.755:1256): pid=4336 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/753/cgroup.controllers" dev="sda1" ino=16884 res=1 [ 1030.588807][ T4337] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1030.725544][ T4334] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:02:17 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000000)={0x3, 0xb53, 0x0, 0x7}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r4}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:02:18 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:18 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xf0ffffff, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x31c, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:18 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) syz_init_net_socket$ax25(0x3, 0x2, 0xcc) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r4 = socket(0x6, 0xa, 0x6) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="e66729a4", @ANYRES16=r6, @ANYBLOB="230900000000000000000100000005000700000000000800090000000000060002000100000008000a000000000008001700", @ANYRES32, @ANYBLOB="d8cbc2127eacc3ea6619d396a405e00481bebd980b197dee8b01a1f8828721e7eb6f0f90f11720fe428ba84b59829741c8a38b26e72f29f97a17e8c1b09afc6fcc0fe455e4c84cd69b10646eb4a048b52eb3644d346bcbe3f7094a6bc51def1e8fb082708b7bf2b90cba03511df9676bbb6ec4f60d2d2dc57a5ce4f8ff6e6a8fa9102538a5bbbbc4ab8c0ca7"], 0x5}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r4, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r6, 0x2, 0x1ff, 0x25dfdbff, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048010}, 0x20040800) sendmsg$NL80211_CMD_DEL_KEY(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r3, 0x800, 0x70bd2b, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x80) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) [ 1031.022784][ T4361] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:18 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x4c00}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:18 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000004) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x322, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:18 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:18 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xfe0f0000, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:18 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') sendmsg$NL80211_CMD_SET_KEY(r2, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)={0x7c, r3, 0x10, 0x70bd27, 0x25dfdbff, {}, [@NL80211_ATTR_KEY={0x1c, 0x50, 0x0, 0x1, [@NL80211_KEY_IDX={0x5, 0x2, 0x1}, @NL80211_KEY_MODE={0x5, 0x9, 0x1}, @NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_DEFAULT={0x4}]}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x1c, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "b157514c71"}, @NL80211_ATTR_KEY_SEQ={0xb, 0xa, "9c6647581fefd5"}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac05}, @NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x40000010) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_all\x00', 0xb00000000065808, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r5, r4, 0x0, 0x100000001) r6 = socket(0xa, 0x1, 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f00000000c0)={r8}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000000)={r8, 0x2}, &(0x7f0000000040)=0x8) 10:02:19 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0x0, {0xfbbea791194d9ba3}}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="b8e3b351a0bc020000", 0x9}, 0x1, 0x0, 0x0, 0x41}, 0x0) [ 1031.802813][ T4382] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x360, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1031.857347][ T27] kauditd_printk_skb: 8 callbacks suppressed [ 1031.857362][ T27] audit: type=1804 audit(1585908139.045:1265): pid=4379 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/682/cgroup.controllers" dev="sda1" ino=16899 res=1 10:02:19 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) pipe(&(0x7f0000000600)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) ioctl$SIOCGETLINKNAME(r2, 0x89e0, &(0x7f0000000280)={0x2, 0x1}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x100000001) openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000300)={0x18, 0x0, {0x1, @random="54df2ce6efa5", 'netdevsim0\x00'}}) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r6, @ANYBLOB="0100000000000000240012800b00010062726964676500001400028005001900000000000800050000000100"], 0x44}}, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r8, r7, 0x0, 0x100000001) sendmsg$can_j1939(r7, &(0x7f0000000080)={&(0x7f00000000c0)={0x1d, r6, 0x0, {0x0, 0x11e}, 0xfd}, 0x18, &(0x7f0000000b80)={&(0x7f0000000000)="0000d1791fdefd91e921dc51762600"/35, 0x23}, 0x1, 0x0, 0x0, 0x41080}, 0x40000) 10:02:19 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1031.983244][ T4379] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1032.000347][ T4395] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:19 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xfeff0000, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x368, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1032.236341][ T27] audit: type=1804 audit(1585908139.425:1266): pid=4407 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/756/cgroup.controllers" dev="sda1" ino=16897 res=1 [ 1032.269549][ T4410] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:20 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x6000}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:20 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000005) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:20 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x39e, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:20 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) r2 = socket$l2tp6(0xa, 0x2, 0x73) recvfrom(r2, &(0x7f0000000000)=""/76, 0x4c, 0x10000, &(0x7f00000000c0)=@pppoe={0x18, 0x0, {0x4, @dev={[], 0x2e}, 'macvlan1\x00'}}, 0x80) 10:02:20 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xff0f0000, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1033.093960][ T4428] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x3c2, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1033.185651][ T27] audit: type=1804 audit(1585908140.375:1267): pid=4433 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/683/cgroup.controllers" dev="sda1" ino=16916 res=1 [ 1033.238690][ T27] audit: type=1804 audit(1585908140.405:1268): pid=4431 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/757/cgroup.controllers" dev="sda1" ino=16918 res=1 10:02:20 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xfffd1c01, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1033.298024][ T4443] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1033.308626][ T4433] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:02:20 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) socket$netlink(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x420, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1033.747933][ T27] audit: type=1804 audit(1585908140.936:1269): pid=4451 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/758/cgroup.controllers" dev="sda1" ino=16918 res=1 10:02:21 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000006) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1033.844727][ T4457] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1033.920009][ T4451] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:02:21 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000000)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) [ 1034.034949][ T27] audit: type=1804 audit(1585908141.226:1270): pid=4462 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/684/cgroup.controllers" dev="sda1" ino=16916 res=1 [ 1034.064242][ T4462] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:02:21 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x6800}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:21 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xfffff000, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x500, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:21 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) bind$can_j1939(r0, &(0x7f0000000240), 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) ioctl$SIOCX25SSUBSCRIP(r1, 0x89e1, &(0x7f00000000c0)={'veth1\x00', 0x6, 0x9}) 10:02:21 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) socket$netlink(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1034.273626][ T4478] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x600, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:21 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) r2 = accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x10) bind(r2, &(0x7f00000000c0)=@vsock={0x28, 0x0, 0x2711, @hyper}, 0x80) [ 1034.376016][ T27] audit: type=1804 audit(1585908141.566:1271): pid=4480 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/759/cgroup.controllers" dev="sda1" ino=16919 res=1 10:02:21 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000007) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1034.408222][ T27] audit: type=1804 audit(1585908141.596:1272): pid=4468 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/684/cgroup.controllers" dev="sda1" ino=16916 res=1 [ 1034.464451][ T4480] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1034.495622][ T27] audit: type=1804 audit(1585908141.596:1273): pid=4462 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/684/cgroup.controllers" dev="sda1" ino=16916 res=1 [ 1034.501718][ T4494] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:21 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xffffff7f, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:21 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.mem_hardwall\x00', 0x2, 0x0) ioctl(r1, 0x80, &(0x7f0000000300)="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") pwritev(r1, &(0x7f00000001c0)=[{&(0x7f00000002c0)='1', 0x1}], 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000020008103e00f80ecdb4cb9020200000400000001810040fb12001100040fda1b40d819a906000500020f", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) pwrite64(r3, &(0x7f0000000200)="5ef3e689caa45b5c350a1ae689f7cfcdd61377e261aa8cb7721b9625e36d520db7283a5482b7dab0a331d36007f5db96d6b8b3168b7325fc6bcd229433d1d8e5a359b9599ce84bff701234dbe8c1bf1a48af", 0x52, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r2, 0x0) ioctl$SIOCAX25GETINFOOLD(r2, 0x89e9, &(0x7f0000000040)) clock_gettime(0x6, &(0x7f0000000140)) r4 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'netdevsim0\x00', {0x2, 0x4e24, @local}}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r6, r5, 0x0, 0x100000001) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r4, &(0x7f0000000240)={0x1d, r7}, 0x18) [ 1034.672459][ T27] audit: type=1804 audit(1585908141.866:1274): pid=4498 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/685/cgroup.controllers" dev="sda1" ino=16888 res=1 10:02:21 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) socket$netlink(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x700, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1034.928053][ T4510] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1034.995431][ T4498] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1035.177428][ T4505] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:02:22 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000008) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x801, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:22 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x0, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:22 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xffffff9e, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:22 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) setsockopt$SO_J1939_ERRQUEUE(r1, 0x6b, 0x4, &(0x7f0000000040)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r3}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) socket$caif_seqpacket(0x25, 0x5, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r4, 0x54e3, 0x0) 10:02:22 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x6c00}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:23 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) r2 = socket$inet(0x2, 0x2, 0x1) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r5, @ANYBLOB="0100000000000000240012800b00010062726964676500001400028005001900000000000800050000000100"], 0x44}}, 0x0) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000000)={r5, @empty, @multicast2}, 0xc) [ 1035.848845][ T4537] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:23 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xfffffff0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1035.962662][ T4527] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1035.978532][ T4532] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:02:23 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000009) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:23 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r1, r0, 0x0, 0x100000001) recvmmsg(r1, &(0x7f00000057c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/101, 0x65}], 0x1, &(0x7f0000000100)=""/109, 0x6d}, 0x40}, {{&(0x7f00000002c0)=@x25, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000180)=""/47, 0x2f}, {&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000340)=""/72, 0x48}], 0x3, &(0x7f0000000400)=""/245, 0xf5}, 0x889}, {{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000500)=""/138, 0x8a}, {&(0x7f00000005c0)=""/134, 0x86}, {&(0x7f0000001bc0)=""/4096, 0x1000}, {&(0x7f0000000680)=""/122, 0x7a}, {&(0x7f0000000700)=""/29, 0x1d}], 0x5, &(0x7f00000007c0)=""/218, 0xda}, 0x1}, {{&(0x7f00000008c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000002cc0)=[{&(0x7f0000000940)=""/23, 0x17}, {&(0x7f0000000980)}, {&(0x7f00000009c0)=""/117, 0x75}, {&(0x7f0000000a40)=""/161, 0xa1}, {&(0x7f0000002bc0)=""/203, 0xcb}], 0x5}, 0xffff}, {{0x0, 0x0, &(0x7f0000004100)=[{&(0x7f0000002d40)=""/87, 0x57}, {&(0x7f0000002dc0)=""/158, 0x9e}, {&(0x7f0000002e80)=""/4096, 0x1000}, {&(0x7f0000003e80)=""/101, 0x65}, {&(0x7f0000003f00)=""/231, 0xe7}, {&(0x7f0000004000)=""/221, 0xdd}], 0x6, &(0x7f0000004180)=""/89, 0x59}, 0x8}, {{0x0, 0x0, &(0x7f0000005640)=[{&(0x7f0000004200)=""/208, 0xd0}, {&(0x7f0000004300)=""/4096, 0x1000}, {&(0x7f0000005300)=""/153, 0x99}, {&(0x7f00000053c0)=""/170, 0xaa}, {&(0x7f0000005480)=""/237, 0xed}, {&(0x7f0000005580)=""/174, 0xae}], 0x6, &(0x7f00000056c0)=""/197, 0xc5}, 0x1}], 0x6, 0x1, &(0x7f0000000b00)={0x0, 0x1c9c380}) setsockopt$RXRPC_SECURITY_KEY(r2, 0x110, 0x1, &(0x7f0000005940)='vcan0\x00', 0x6) r3 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r3, &(0x7f0000000240)={0x1d, r4}, 0x18) sendmsg$can_j1939(r3, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:02:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0xe02, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:23 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) r2 = accept4$tipc(0xffffffffffffffff, &(0x7f0000000000)=@id, &(0x7f0000000040)=0x10, 0x80000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r6, r5, 0x0, 0x100000001) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r8, r7, 0x0, 0x100000001) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f00000000c0)={0x8, 0x1, 0x7, 0x0, 0x0, [{{r3}, 0xa97}, {{r4}, 0xff}, {{r0}}, {{r6}, 0x401}, {{r7}, 0x85d0}, {{}, 0x2}, {{r0}, 0xa3}]}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) [ 1036.567964][ T4548] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1036.577691][ T4558] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:23 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xffffffff, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:23 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x0, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x1201, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:24 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x9) sendfile(r4, r3, 0x0, 0x100000001) setsockopt$CAN_RAW_FD_FRAMES(r3, 0x65, 0x5, &(0x7f0000000300), 0x4) r5 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r5, r2, 0x0, 0x100000001) r6 = socket$netlink(0x10, 0x3, 0x0) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") socket$isdn(0x22, 0x3, 0x23) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r6, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="a00000000308050000000000000000000500000a050003002f000000050003002f0000000900010073797a31000000000900010073797a300000000006000240891400000900010073797a30000000000900010073797a300000000006000240655800003c000480080007400000ffff0800064000006e0f080007400000000108000240000000040800074000000008080006400000889908000240000000ed"], 0xa0}, 0x1, 0x0, 0x0, 0x40801}, 0x40004) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x0, 0x8010}, 0x20000004) [ 1036.899741][ T27] kauditd_printk_skb: 7 callbacks suppressed [ 1036.899756][ T27] audit: type=1804 audit(1585908144.086:1282): pid=4568 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/762/cgroup.controllers" dev="sda1" ino=16927 res=1 [ 1036.939320][ T4572] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:24 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x10000000a) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1037.126125][ T27] audit: type=1804 audit(1585908144.316:1283): pid=4549 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/687/cgroup.controllers" dev="sda1" ino=16923 res=1 [ 1037.286359][ T27] audit: type=1804 audit(1585908144.476:1284): pid=4579 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/688/cgroup.controllers" dev="sda1" ino=16911 res=1 [ 1037.363917][ T4568] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:02:24 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x7400}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x1401, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:24 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0xf, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:24 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = accept(r0, 0x0, &(0x7f00000009c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0100000000000000240012800b00010062726964676500001400028005001900000000000800050000000100"], 0x44}}, 0x0) bind$can_j1939(r1, &(0x7f0000000a00)={0x1d, r4, 0x2, {0x0, 0x1, 0x4}}, 0x18) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r5}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:02:24 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x10, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:24 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x0, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1037.648738][ T4593] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:24 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0xc0, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:25 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0xec0, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1037.904099][ T27] audit: type=1804 audit(1585908145.096:1285): pid=4600 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/763/cgroup.controllers" dev="sda1" ino=16931 res=1 10:02:25 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x33fe0, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1038.011204][ T27] audit: type=1804 audit(1585908145.196:1286): pid=4580 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/688/cgroup.controllers" dev="sda1" ino=16911 res=1 10:02:25 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x10000000b) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:25 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x200000ac, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x1c03, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1038.272733][ T27] audit: type=1804 audit(1585908145.466:1287): pid=4616 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/689/cgroup.controllers" dev="sda1" ino=16911 res=1 [ 1038.297760][ T4620] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:25 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x7a00}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:25 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r4 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r7 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)={0x24, r6, 0x11, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r8}, @NL80211_ATTR_WIPHY_RETRY_SHORT={0x5, 0x3d, 0x5}]}, 0x24}}, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r10, r9, 0x0, 0x100000001) sendmsg$NL80211_CMD_SET_WIPHY(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)={0x24, 0x0, 0x11, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_WIPHY_COVERAGE_CLASS={0x5, 0x59, 0x2}]}, 0x24}}, 0x8001) sendmsg$NL80211_CMD_NEW_MPATH(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r3, 0x8, 0x70bd2d, 0x25dfdbfd, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x32c1, 0x3}}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @multicast}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x24044000) 10:02:25 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x7ffff000, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x2000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:25 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x10000000c) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:25 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, 0x0) [ 1038.761425][ T4634] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:26 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0xfffffdef, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:26 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000780)={&(0x7f0000000000)=@tipc=@id, 0x80, &(0x7f0000000680)=[{&(0x7f00000000c0)=""/224, 0xe0}, {&(0x7f00000002c0)=""/254, 0xfe}, {&(0x7f00000003c0)=""/142, 0x8e}, {&(0x7f0000000480)=""/48, 0x30}, {&(0x7f00000004c0)=""/198, 0xc6}, {&(0x7f00000005c0)=""/139, 0x8b}], 0x6, &(0x7f0000000700)=""/128, 0x80}, 0x12100) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x3c, r2, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vlan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000880)={&(0x7f00000007c0), 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x1c, r2, 0x2, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44004}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r3}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) [ 1038.817131][ T27] audit: type=1804 audit(1585908146.006:1288): pid=4631 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/764/cgroup.controllers" dev="sda1" ino=16923 res=1 [ 1038.824109][ T4631] __nla_validate_parse: 3 callbacks suppressed [ 1038.824119][ T4631] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1038.894640][ T27] audit: type=1804 audit(1585908146.046:1289): pid=4641 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/690/cgroup.controllers" dev="sda1" ino=16931 res=1 10:02:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x2004, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1038.965414][ T4635] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:02:26 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) setsockopt$llc_int(r2, 0x10c, 0x2, &(0x7f0000000000)=0x2, 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r4, r3, 0x0, 0x100000001) sendmsg$can_j1939(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)="51914e8e1e19801e31d0ea324f47f64baf4d978fe4fdc5633f618727fbf408903e8a412aee36deba102a8a3e48ee03e142849e274b1a5e243cef773fcf1aba371c9e033b0271beb23853bbb79634a3a371", 0x51}, 0x1, 0x0, 0x0, 0x2000c844}, 0x800) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:02:26 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x2, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1039.100575][ T4655] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:26 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x7, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1039.215304][ T27] audit: type=1804 audit(1585908146.406:1290): pid=4641 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/690/cgroup.controllers" dev="sda1" ino=16931 res=1 [ 1039.365162][ T27] audit: type=1804 audit(1585908146.446:1291): pid=4635 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/690/cgroup.controllers" dev="sda1" ino=16931 res=1 10:02:27 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x800e}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:27 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x10000000f) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:27 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0xa, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:27 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x4e23, 0x38, @dev={0xfe, 0x80, [], 0x26}, 0x8}}, 0x0, 0x0, 0x41, 0x0, "935b181f9949b44d48edea88834c56135cc4b3512758921c1642a5175f235a0cdf73bd0904ef93be9e34dc8f54a6cc708cfdc35427299b1eaf9b10bc3ddb96736f73198b3c2ba5eed96812dae9b997af"}, 0xd8) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:02:27 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, 0x0) 10:02:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x2203, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1040.052635][ T4679] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:27 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0xf, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x2c01, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1040.148991][ T4680] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1040.183961][ T4684] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:02:27 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x73, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:27 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, 0x0) [ 1040.385753][ T4699] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:27 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x402, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:27 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000010) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1040.739201][ T4703] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1040.749184][ T4709] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:02:28 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0xff00}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:28 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:28 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000000c0), 0x4) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000)={0x1}, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1, 0x3, {0x0, 0x0, 0x1}, 0xfe}, 0x18) socketpair(0x29, 0x4, 0x2, &(0x7f0000000140)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x100000001) r4 = accept4(r3, &(0x7f0000001ec0)=@in={0x2, 0x0, @local}, &(0x7f0000001f40)=0x80, 0x800) socket$nl_route(0x10, 0x3, 0x0) sendmsg$can_j1939(r4, &(0x7f0000000100)={&(0x7f0000000b40)={0x1d, 0x0, 0x2, {0x1, 0xff}, 0x1}, 0x18, &(0x7f0000000b80)={&(0x7f0000000080)="2a25080000006651100b95286c47d2b0dda14722a2ef8300"/39, 0x27}}, 0x20004044) r5 = accept4(0xffffffffffffffff, &(0x7f00000005c0)=@ll, &(0x7f0000000640)=0x80, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000640)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x30, r7, 0x5, 0x0, 0x0, {}, [@SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd98}]}, 0x30}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r5, &(0x7f0000000740)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x24, r7, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000874}, 0x20044040) 10:02:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x2e02, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:28 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)) [ 1041.022484][ T4719] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:28 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 10:02:28 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) r3 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f00000002c0)=@security={'security\x00', 0xe, 0x4, 0x3f0, 0xffffffff, 0x0, 0x120, 0x0, 0xffffffff, 0xffffffff, 0x358, 0x358, 0x358, 0xffffffff, 0x4, &(0x7f0000000000), {[{{@uncond, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz0\x00', 0x0, 0x8, 0x2, 0x1}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x1, 0x1, 0x4, 0x2], 0x0, 0x4}, {0x1, [0x3ad613e68e40e9ba, 0x7, 0x4, 0x2, 0x1, 0x4], 0x3, 0x7}}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x12}, @rand_addr=0x6, 0x0, 0xff000000, 'bridge_slave_1\x00', 'veth1_macvtap\x00', {0xff}, {}, 0x33, 0x0, 0x53}, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0x5}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x46, 0x81, 0x1, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x6, 0x10, [0x1, 0x4, 0x37, 0x26, 0x34, 0x27, 0x1f, 0x1d, 0x3f, 0x19, 0x1f, 0x5, 0x20, 0x9, 0x3e, 0x36], 0x2, 0x9}}}, {{@ip={@empty, @loopback, 0xff, 0xff000000, 'veth1_to_bond\x00', '\x00', {0xff}, {}, 0x33, 0x3, 0x30}, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0x4, 0x1, 0x2}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x4, 0x1f, 0x4}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x450) 10:02:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x3201, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1041.185797][ T4724] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1041.300588][ T4740] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:28 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x405, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:28 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)) 10:02:28 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) sendmmsg$inet6(r4, &(0x7f0000003f80)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x200, @rand_addr="ac3e315c990ceefbf8694b8e2fc39d50", 0x80000000}, 0x1c, &(0x7f0000000680)=[{&(0x7f00000000c0)="9603508f5879b777cb65e9a542c0ee83370984fde4ae10b2b75a67a31b463b31294e12d90916333d48b932068b283e435490d559ee5b6ca034fd986fb430721d576f33d58312439ed26f5ea1354619f0478784edce50ab7b073270441aa69b06d5a20e4ce38d24f3c2179d01cc4e5ae184d05b3788f449b449d71005c00de05b97683f8d9f9cd3749e5bdada2db6aa8bdba5b3aca06717b6", 0x98}, {&(0x7f00000002c0)="432f0b901cc35270adcdea274d6c43c3bc78a410bac9a684bb16d83c92e4f039ebd648e1a34c8bc8da23e93f0f54d978d13c6ee21842f94a871d2aa0f973918baeaea4e156b021c2e5fb23a98dfdd2170723c1d2177786be3f9a50c59adfb1aeb161eacf2e476ce02c32c8d2e57f71e70e687789fc1445b43b5bf7d0dab9de7f079a3c9fca3feb8ee85dff50f6baba3ae2d9e0422ab23e32fed56b94f8cc033d351f82e7720da128a51db7444f963c9b1e370e6f76ed24d00c19f526c7379e246331159cd34f20e59ccaf0e6ec0fa05441c70fb1164d03982f0d944a5fc0a1216187647148788d56d772affb", 0xec}, {&(0x7f0000000bc0)="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", 0x1000}, {&(0x7f0000001bc0)="db9c080993ec94dbe1ebf4df47de267c7c47998481fff2d396c3f9a3b7c81164bdac3442d038b8d1e77d010840c32e6c3a5a8c48c2bd67f12a9c10eba479df192cb1aa2a88586668bdb61be8b82748f12db0056e3ff1026a69658bb8e3cf44cd275ed5b881911f4fbcf40806900a8f3c8be4ad6ea6560294b598da479efbd4f81f9718cb35fb7965863d84e087614c982be0ce97e9824259eadcb146963b0a3207c2b908758c98ffc8c930a576ba105920946a5362692a85ad85634dd0c2577ad2f3b76875408d9af86694713efb10a0e3a606ac05969258cea6dbb79816a2834b6fee08e1047ecc027745ca73d1d442601bc475ed5b67836a4f9bb95770be055ef8ce3b2cc077b549cf1c2d116d3a2ff873259567133e844ad39c1e273b89271cc387a336ee6b4d0ba2d096c2fc173e5097c3d665f8bb504dcdf007a7962c9fe824ccfba8b65afa46d3c86d7a41c8101e97c91c50f033aa6ab2da7901df33d7fc4d51b4215378934f2c70f908bba6545bef4bd7e1dc928bcc22d34445e69cf3920449eed192c6e611ca151a7a75e0e2ca4c4df8ef20450277f5b557a95ab99425225f10028dc638995223b9ee64dad6d12014064595a9b7f46b385cdb0a2e38843ba4870a12d651c7d6c205fb185d045041528b49991815915c47ddd1083cbd32f864c30ab1096672cc7f95b87d6a6caa8a3bfc76a7d0919b61b089d995148fe0472168cacd0500205c9b5cf578b21892ed28b34ede84fc3a5b009c99f996532fab19d07d50cbdae155875d1a5e41cddf667bce8d1d7836dc85634a69158b3e3c43dd46f175e876403805ed5e6ef8acf3eab501881570f80f0209baa4f0d8a3ac26a05d09e5cb15965e922258285baf1f95d2d2b313260e5749cf27c21a20630190311b0f9aae7a09cd2a14087353d74d1e4c0cab3883f08222b6ba935a8e0c937576d650558902b892dd6e7ff14ce7442a909f0205f8309d250a068833310234a7d8959765e566abfd72c8676b47b91d31aa4add0ca78ceaa21d6101d0107c9b690d8886c2fe9e52153dcf3f1da0689e01904e464c0af443241315d0c3af722e6393b0880fa7995bcb072744eaef34244a9a84d2f452b38584a96b1e4df2850b4a569df3dc797c63cfcd3e98a99a79f935581f6710a99a81bc0c2073bde28c3dcd6f5cd20bea7bae214fd71b3e57ec5a01b8cba259f853c6dcf15c5e1d7356a5c226e1c200cbb9c82c2f1a27df1fd017d2bc0871486a16e9337db95de24f7872a63808c11e6132b127e09223da5870fac5669613caeafb47fad5d2aa34133cfb1a1af4c20633c9c44b8f30fb5c6aaca45d91c7c68400f3b4930cdf4db2c9483496deb1f27a98485d0e1e13c22e888df1807eb97229f1b2887f42b8af045ed9bd66207bdda4f3b857ffbc97d6e1b2dbc9e961fca8cbc57593086ce62af9b1c58afd1192dc0d85a34666dd017aab9981924369d84632c69c049328e33272227370c8d2a497a9451a89488aa4847b5143c75ed59f370bf10ad9abac9e47d466cc725ef962d071761c670151c49ede298d1778cae604a39d85dd5eab296d2fce38337b698298a85919af6238e7d410350543cd7674c046fd0615c8c9c813be324f7c31a239583c224b6b719098189fb02fdeed75c6253a553db7147149a8af1895b4d80b580bfc412b334ce73340a2e10727b01ca30a32ff42cbcd053421d30017d345ba9bad919a965247b66407a861e8de076891c51989f0922d36e12de391891d229b8e5420a3fa7fb3934b2b02dbacf80a73ccb4609475da0dba50f265ee465040bfb15132ce7d087176ecd776e0f6ef1b9c1398d53e22c8516c6634acadce296ad9013e2b98719a765b8f4e792c40a51a13b0b13e352fbca6a98b7495f7edacd4e65b6235aa441f167bebbce73c04cd02ac40afdb65b9407a1722874e5058f1aa2852f5ac3cf851e586ef135c64f283ce003c77eb5bde9e58ce5634c795414f9a6b6a503ac360d5e2076172ad382b85d5500a4902d7a40878920455fa2cedfd4e4a48d210b5035e07ec8d88ff9c73966da4aeb1044f080825a84551b4f986c94d92dea4d5ebc76ffbe72d1341a417e9904d2ce317a883c9cf0013475621d48e170f2ab0274b3b1772bf5abb86538c4e84b9af583e1ceaf454863e7f3f3fd7c713fe35d3e72a58c06a3eb5ac5c1292a4e2088535512683111450c39ea0be158ccdcd8f8e311d9b31e7652f95bd399f4ea7244b2a2fde21f0dc2e0a94ad53eaa7c696f054a4f78c2f783e7f6c2770c1d60dd08f2727ab3e4c8cfca5e46eadc602df95884e347eac1f1e7b91cd21cfe39b5b836f84bc49418b79c8b86236d0d4bb567397e5bc05e42628fd52d1850b5d9f2439a27642449c0b81814e35d97aaa8a7f37217bc01e3ea55a3d30e27e884365c7344feb6f959361093059bd5638d0ee00f03c560b1eff6a400d7d5686b93d533fc15325a1db019038c4fbeb459021488cc9a668066214f55a6718b2f786ffc204de35640564034f89bc6709d41b08645addc5ab9a6a4f37dc88c7e161466687e3b60967d22af626c69e5f89ad74e6d75f7db517cfe878cac779576c00899d1cf55f93a81821afc967c99312274657c2ea35786bce2a5dd584275a0d6f5a4bf41a924b51e91ad19ae9c830e55b6ec10196be22c1f6a5b4afc278d41bc5649de29ef32d5d8c5747fe8c85b03d7bf0f94e745cc19b1d2de3b8e70917318f7676efce0624d61becc18bcfb372e7c973b73186809bd8208664b3876d3e3671dd47ad37bfe7fce0795fb9bc7cc57e33d679ed8e1a29fc2868e778e8f944b52148bb9eee3c6728b2e9bc5738974145ecc809d7beaa128de801b1e4979936a9237116f6999613a840aa6b8c875ebc13dfe4834d0c4cb0461908c20a3c174467a647b27509088ecafba27275df22da7bdbe710b31ac15adf539a99f20df3b2a02dc55e76248b61cdbf53b148cbdac1ae8dd417b42c1f0fbaf353392288c1851a66b395dc7b9a8eb787b91fb25bc3a79a4c46215ef34f66337c42db3cd89f758df8ee12a30a1cf474e879b6c900861775dadaf16bb02e815e7b28882f63bb1a6d771a3fa172c087f1793e1ec0e7f19dc484791d3c85bf5bc9cda81c3aca4f209a588b49c50215a8c3835fd2f0b02c52ace338e02742bf0d1c7b8c997e354e4ae74e1772d470fe9fe54569f36140a05c7a86f60312118621242d9710e4558b69c75049672e11612055d2850d3265e5ce0f23cefc952dba12d3c77e50c5cab8413b9b224a4b825c3820dbad6acc3b95d49b9f7636b265455f9ae8fa0db3825d796135183b50756ee6fcbb552bd1b609dff8314e0deb40caf3672fd4480cb0e38db8348d961c936283141ef7a3c3dff0cb59366e18f0b941452922d7f0fc3b22a509e1b3ce0415fcb7385d7368a1db38282202dec57121bf33c35c60437d4357f317fe77f7e7ca43d699802bf1f0f9f7ce41b4cedc2ad7eb2c551cd713a3e842ff0d1ed06e38cfd01145e39f420502fa357c08198de08324d79e68380f956985481711811b7f1a701d9a73c38a2503e68cc5d84765e6303299bd132921db6a57d2ebf1fce5d218355c3d10ef22e098c873323a087beeafad3941db3638959fa31b40ed6b7b335515b7f24c26380d428f377412140fd965ab586189c32552c5804bf6e35b1425eecc6d1183a552464ac4a265293feffafa88fccffe6c39c26bedb2036a4844a782537333119b60d06a6df76c9cb8dba36844a89d1ce102dfda235871a1e8e321f9480b41cc954dd01e159e80f1f167e9c670db0bd3f66676958ed855e76154eafc828cf3160ea90e58040580eb162c2406dafecaedb94d7ab17e1134f54aaa58c465a2b40f3b896f6690dc4c53402f618735038e87bfdb1ba478882d6a1abd97fc7798bf171f010f1b80fa22f202eccbad9bcf99c2fcf2eee11d5303df17e8d8a6b72312fb32ea09cd081c57650f396a9174ff29e52c29ec2fb962cbbe84cd7d045770bda0ae27e8c1f150ff79ce92bdf36331327fe5a46d5b8c77868b84e880d705919eca7d2465f321fad1ece76d25ab10f19ba8948aa8d1b38bf3af916d005c1addce540c9e9fa83afdd5d166de726294263ab262602b88aba8938fe7035d00a164844a87ae3e74aebef8e7d79a486758e2f43cd948d02e9777d4982d42dc57ad6c9760fec81c7f75860aa4f54c94b5f0eabcc75f1a59f2e6bc3a0e8232c0878aee1cc1907c2c6b7cd747a20e3a64990a8fc58b0038c5920b99bdff2244445e3f6e6102ef61b653cd9b8a0c2f8cdf57303bf4205b9c44670f98f99aeaeab70f83354fc4b4edebe5af5f08d1bc41bfc3d30d40ea0fd5d24bcc153b28d347083ba3b9e3c827322ce765356be54b6450a1dbf6d9f5b044916e09096180954dac2e11fea5f60a0ba853e8514fcef16b19b271c2a5c7ec588fbdc50debced1b9865b084d018acb74227045e6c6fb2a7f1dad955bb9058ca13e42c47aeb404c9a33881a867360ea6fa3bbc020baa79fc069095802ee476fd974bec0a4a253fcfd8915d56a669a8e209394d0fda01388273c65537c6a0399c1330a3178f152e99dcee82924fc58282f84c6ea5359f2e9259b042f280bfec36f5650c3ee792f853033aca54b5b5ad9d056db308c8baf660b0bb53a4a41586865f6442c2282eb611a8962e4245102ca6af5486d8f8410c70ef1910d4e2208122e9e6af6e355527c15062566871c7b747e3c632718697b5734cf3e3f3140a2a443d7a46f929f85a2e261c83a9b0ef8f7c06012682cfb646d60fa47fdaac1a2e9f8ecc6a7eb3167b6c912d0d684bed7b2f62598d91d72fa073c4bfb5b32332eb4b8a4dcd210a44bc8a783741e53fc682c75623093c3f4b9d20a8d97b94d06590558ca2f3246ac3f901f986e9af7cd6b6cd5cc96b8919189c122a99a067013fa2436f14620c4ac31818984574222d176a238696d08074958305bff620f63d75eb854b8306f7de240f547263d69b47392ac01e4050fbbd550cace978b8e9a8735a2a9feee520424b8f14362b921d1aa3f2084e56bcb36c77838f6d0794ca0ebb11d235ddc04a79e064387957b802a0fb2843f9a1b413d85638ce0ae10b52b131cb4391048fce5178bc09c930eaca03330035a96a43ffa9ecf12813a91032fbc6a953b276faa62c6e54e24707e7d4c6f758fd5dd9b25afbdeea8768ce5de176ecdad8441f1ad144546421078eeb43efb5a61e0a009113df6f0b019495f6bf749adacbee36c39f44489067f399e955f431065adabb28182149daaaad209313fbfbac3fb9392a3a4606343477db1e808fbde6f47a7372de6bfd7b19e3719b3fc275d17e17b2de8f34896f264e319e982c4c2cd5c0f78512a2582015f507e3f57fbe36c20c0a4aab10fd24e54e46df6f5341655353ecfecf218ace02ea8b6368cd44300538f16e4bc89b01506def99e48f814e0a2e9482f5d9a882cdf8bc5a48c28d322db905d09ba6d0b93c08c545c1086eced0a1541d487957e96cb51cd58eef99b95fa9fc2c7c2e600ea9be31eb5553286d48a8395fe2e728df33fb67dcda05482a42e3fd47f7b023903af9cf36cfb93e24ceae7690a17909c7a114fb720f5e09f9e3885109cb0c398d311e284fb79f0406d0cd04c983559b1ea01c7364957012c085173529eb3e9cb67bc7ba98def1771b0e8936daf169f679f8e42d9e41b37af9713237a48d232887f3413556daf6454d37a110ef1ddac1aa180fc9d66efdcc91a988b42befd69b6a299ceeb760dc268b938b679363b3bd0f4f7", 0x1000}, {&(0x7f00000003c0)="09ef584d467c5e94992499366486ebd80703777c6ac1971e2e15b90c1569ed5d75a7b16999d359c5129e8fcf521cf479171ed5d506e0a018df0b37da2b4c1beee3452896ecf96746f94087c1f985739e022d19207b666af98e3a1ef6ba1530bea1074faa3266883c9d35b51489bb36a7dd53d9c23e49801105de8f19b2bf511f7f17471c5d33e44e22a350380e1ffb585425e4f935dcc50b3b7fd61a0da2e6b3b7e4857b957b7baf5e1aa8d65b7f4482b9cc9001e6ed99025ba19242f3a259c0fbbdc4f5f1da4182f55ce278177df717df769890381d34b83ec2e2a2c994", 0xde}, {&(0x7f00000004c0)="5d1012b6e64a033666b39ada1f92fcaa004177c64a0dc4d39b146074a3ff2a35c885634ccb5a1e969e7e1772a9d7f3d9e85fa0f47ea9455470d5386d7e39e7ff641b58f798a98b66c4071ef02f53702138740d78112483eb94a0ef1fd15c4c75fa8af695aa8a5227b1598bbe98421023fa9a5ed4bce65a5ea620b569b0bbff73462e6db0914a27823f5025d4b4b479b7b6e7f1937a96e6d6256194a04e60c2d0b075b4529b533b7f10724fa6071b62a56b0552319e08", 0xb6}, {&(0x7f0000002bc0)="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", 0x1000}, {&(0x7f0000000040)="bc34a9c20f7e26520b57548b61bfa0a815632dcd98c94901", 0x18}, {&(0x7f0000000580)="f314abfe8087424744cc62f30bae6aee4883b7c548e16f08533bf595b31ca0fc7ec7d17dcebbf8036bfbe8d5eac7c693ec921155e4373b163629d9bb19191b22137ae3442dfed6246664ef8ba3a3e342c47cf7bdd75d9a5482323568", 0x5c}, {&(0x7f0000000600)="40e4d107ee9f61b8f875ef61d160bd8f218873548d846b9aa74ad338fa4cc85fbbaec61591322d91302fa3384af40e1d97b999ddcdb4eb92cb8fecf6cc69a0cb827ea756fe04a817ee5da358d61de139eba7d0ff13ad351539309249f6836a2be22fe46293019f6a6dcbb03966563d1ee74011ee6fb5", 0x76}], 0xa, &(0x7f0000000740)=[@hopopts_2292={{0x108, 0x29, 0x36, {0x21, 0x1d, [], [@hao={0xc9, 0x10, @ipv4={[], [], @multicast1}}, @ra={0x5, 0x2, 0x2b}, @calipso={0x7, 0x50, {0x1, 0x12, 0xae, 0x40, [0x5, 0x400000000, 0x5, 0x0, 0x2, 0x1, 0x8, 0x4d97, 0xcf]}}, @enc_lim={0x4, 0x1, 0x17}, @ra={0x5, 0x2, 0x40}, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x48, {0x3, 0x10, 0x16, 0x8, [0xfffffffffffffffa, 0x80000001, 0x8, 0x3, 0x1, 0x5, 0xab, 0x1ff]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x9, 0x400, [0x1000, 0x9, 0x5, 0x3]}}]}}}, @dstopts={{0x50, 0x29, 0x37, {0x3a, 0x6, [], [@calipso={0x7, 0x30, {0x0, 0xa, 0x8f, 0x800, [0x4, 0x401, 0x0, 0x200, 0x2]}}, @pad1]}}}, @hoplimit={{0x14, 0x29, 0x34, 0xffffffc1}}, @rthdr={{0x88, 0x29, 0x39, {0x6, 0xe, 0x1, 0x31, 0x0, [@mcast1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @dev={0xfe, 0x80, [], 0x15}, @local, @mcast2, @mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}]}}}, @hopopts={{0x38, 0x29, 0x36, {0x33, 0x4, [], [@pad1, @generic={0xdf, 0x5, "16b7a1fc34"}, @ra={0x5, 0x2, 0x4}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}}}, @hopopts={{0xf0, 0x29, 0x36, {0x3f, 0x1a, [], [@pad1, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @generic={0x1, 0x50, "f1597ab3283a20a9d02a393417bc47509a96d4e2b6bd51ae4e304188ab8114442d2a1cf8e4b190f94636da57fb704245bb8bd936500fadb618a129a2b8c8f29a6c89fc4b8e42a120813fd723457de200"}, @calipso={0x7, 0x28, {0x1, 0x8, 0xfe, 0x1, [0x73, 0x9, 0x2, 0x2]}}, @padn={0x1, 0x1, [0x0]}, @calipso={0x7, 0x48, {0x3, 0x10, 0x2, 0xff7f, [0x81, 0x1000, 0x9229, 0x9, 0x8, 0x1, 0x3, 0x40]}}]}}}, @tclass={{0x14, 0x29, 0x43, 0x117d3447}}, @tclass={{0x14, 0x29, 0x43, 0x2}}, @rthdr_2292={{0x38, 0x29, 0x39, {0x33, 0x4, 0x2, 0x8, 0x0, [@empty, @remote]}}}, @rthdrdstopts={{0x48, 0x29, 0x37, {0x73, 0x5, [], [@enc_lim={0x4, 0x1, 0x20}, @hao={0xc9, 0x10, @rand_addr="371db18d896c217e229344e07a4eb622"}, @pad1, @enc_lim={0x4, 0x1, 0xfa}, @pad1, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @enc_lim, @enc_lim={0x4, 0x1, 0x63}]}}}], 0x3d0}}, {{&(0x7f0000000180)={0xa, 0x4e21, 0x7f, @remote}, 0x1c, &(0x7f0000003cc0)=[{&(0x7f0000003bc0)="72adcdec5d214cb0ae2c55ab9278c52b4c69abea3b01839272ae491044a334d02c8e5c58ff74b3b5e3f5cc878d546388bd2b293051088272399ff2e97c2c9d5ecd7e99a971b27ca9fb11b730b6d86d2ce5fce9b0123e6cb05b35574c3a3d1b695939940c18e6e26a0337bb1d5c9a51b595bf2594c63efb0a1db11d1f7af0e3f083f24071b289845f93ebbbe61511f91df77fae47ba84a7826f8169cfee9e44076e921a7603d6e0ab279da76ace2e04968c950dcb09c69a9d038fe81ddea722da949f5eee9446f69c", 0xc8}], 0x1, &(0x7f0000003d00)=[@rthdrdstopts={{0x108, 0x29, 0x37, {0x32, 0x1d, [], [@generic={0x8, 0xe7, "7140e6bb38de21d96ca9ec07aa18871cfc751c6f2084f2babd0e896734b8b0d917be982b141e6c3ed0cbfd8ce4dadcfb83f723afe58405157eba903edc31105d20a8a2893b297ace4d2d3b1d92071bf5c370b2416cf80f783adf4db17a28dbef049f9db1c7887a44057bc4c625ea38308a4d4019beb449dfe2c3c6d48daa605a8c0afe66912f689c2842a53bec75bcc008eb6fee63dfd4314cd40096153170ada4583d5c33be963278c00326c3085cb82a27b6a70ac5be59800ecc8779b195d5f7c3252eba7c76de0a4bc7b9406a62d750bcdeeea91eff52042a990f5837cd096c870d01aa85a8"}]}}}, @dstopts={{0xf8, 0x29, 0x37, {0x2f, 0x1b, [], [@generic={0x1, 0x6e, "cfd45bc84f1ed6c2e7c9e02851493b89b97ac2336b448136f7e479966bc5d9397866e1347188bb5dfa1f9285c770f4f129e82a441be208bd12141cb43c7a08cce34982d825e12e13e30ff746fe1787303d3330481aabfeaf33f064881cd8f24b7b66b72aa2344cd8ee31e3f63052"}, @hao={0xc9, 0x10, @mcast2}, @pad1, @generic={0x3f, 0x33, "7ed0ebc0a777441f35011bbb48cd09f00e518e8627f6adce21e7203e598cb0379d762cbc7bd248127da7bf7ee76b0919301322"}, @jumbo={0xc2, 0x4, 0x80000000}, @pad1, @ra={0x5, 0x2, 0x1}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}}}, @dstopts_2292={{0x28, 0x29, 0x4, {0x3b, 0x1, [], [@jumbo={0xc2, 0x4, 0x10000}, @enc_lim={0x4, 0x1, 0xa7}, @ra={0x5, 0x2, 0x3f}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x5}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x6}}], 0x258}}], 0x2, 0x20048801) sendfile(r3, r2, 0x0, 0x100000001) r5 = socket$inet6_mptcp(0xa, 0x1, 0x106) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r7, r6, 0x0, 0x100000001) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000004000)={0x0, r6, 0x99f, 0x7b, 0x0, 0x4}) sendmsg$can_j1939(r2, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:02:28 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000023) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1041.891230][ T4747] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1041.906374][ T4750] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:02:29 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:29 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000000), 0x4) 10:02:29 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x408, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x3c00, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:29 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)) [ 1042.237375][ T4768] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x3e00, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:29 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000009c0)={0xffe0, 0x6, 0x5, 0x8}, 0x8) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r3 = socket$l2tp(0x2, 0x2, 0x73) recvmsg$can_raw(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000780)=[{&(0x7f00000002c0)=""/229, 0xe5}, {&(0x7f00000003c0)=""/121, 0x79}, {&(0x7f0000000440)=""/218, 0xda}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/141, 0x8d}, {&(0x7f0000000680)=""/55, 0x37}, {&(0x7f00000006c0)=""/57, 0x39}, {&(0x7f0000000700)=""/69, 0x45}], 0x8, &(0x7f0000000800)=""/143, 0x8f}, 0x40000000) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000e40)=ANY=[@ANYBLOB="000000000000000007000000000000000300000000000000", @ANYRES32=r3, @ANYBLOB="0000000005007dd3f473f827b805f000000000000000000000050000000000000000000077937163e706a730b89dca30a7bc565b4fe19bbfee6f7956816d0450ad858d9cd400b8311eb7351528c3d27bc228ad1b97c8d99a0232eed2666d7229694f24e308c8c8f87fbcd1c180089eee89a9bc99be0b2ba179f71c99f850c6153f142c2d71b9289272571259606964b1bb76fb59865eb30b4818bd17770a279659fee866fb93c6c829cfadc962af47a90cbbf207bc623b25f050d7182b535628eb1700cb52188315d32c3893f857fa09207119082cc564c71a51e2537d39f4a55e2bf6eb3e50477cf4c034c4deb3d793810ce0f1edd753c3f60fd6470b21fd57c5907387a4c316ba08ddbb00d3fd994d26742f1c667c30759d8924b3a2e29efa764889ac9cb765651d87e081aff5c448599d4629362d4d9b3af93469978d30a7c8f43d19bc6477aaba21769a2f5a61751935fec9c855afddb4c2b7f98ccd0138595b317677e9ac1c1e7cf60e05c4a1bf52b62d281720e84ee0727087a8d24121efc9eabe3f20533bdc901125cd8189f25676aa9a2d707ad856745bb9ac6783cb0d87e0b3140d04865d000000000000000000000000000000a2def3eefac3ac87cbde83005c77d1aaef5081ebc55fa69cf8cfb2c6ae12224783113c0a9c97d1dc9fdecf4f9d34dd53bed747f93afbb226802ca0e17e1bc5500364", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00 \x00'/28, @ANYRES32=r4, @ANYBLOB="0000000b0000ffffffffffff00"/28]) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r6, r5, 0x0, 0x100000001) r7 = socket(0xa, 0x1, 0x0) close(r7) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f0000000a40)=ANY=[@ANYBLOB="0100000e020a5962edba81124da600d748fb55a37f1ad9a550e3c97478cc4e10b8b07b39be9c620955cfda0ff1fed295278765873e1a96c2095b026e050000000007775ae46be561d4b5f82f49ef3fcb7d2bd7a44def11b89f88eb3e1219be9563fed6a7d6c5afe2715ec3b017d4496430718c7d865cdb24c10c51a24b377fe1", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r7, 0x84, 0x11, &(0x7f00000000c0)={r9}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f0000000000)={r9, 0xffff}, &(0x7f0000000040)=0xc) [ 1042.316130][ T27] kauditd_printk_skb: 13 callbacks suppressed [ 1042.316144][ T27] audit: type=1804 audit(1585908149.506:1305): pid=4753 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/693/cgroup.controllers" dev="sda1" ino=16369 res=1 10:02:29 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x40b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:29 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000025) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1042.393868][ T4774] dccp_invalid_packet: P.Data Offset(103) too large [ 1042.401342][ T4771] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1042.456041][ T27] audit: type=1804 audit(1585908149.546:1306): pid=4750 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/693/cgroup.controllers" dev="sda1" ino=16369 res=1 [ 1042.503384][ T4786] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1042.562326][ T27] audit: type=1804 audit(1585908149.576:1307): pid=4771 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/769/cgroup.controllers" dev="sda1" ino=16321 res=1 [ 1042.621138][ T27] audit: type=1804 audit(1585908149.786:1308): pid=4787 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/694/cgroup.controllers" dev="sda1" ino=16305 res=1 10:02:29 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0b") [ 1042.803356][ T27] audit: type=1804 audit(1585908149.997:1309): pid=4793 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/770/cgroup.controllers" dev="sda1" ino=16321 res=1 10:02:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x3e02, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:30 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x410, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:30 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x0, 0x2}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:30 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) write$nbd(r0, &(0x7f0000000000)={0x67446698, 0x1, 0x1, 0x2, 0x3, "619e27eb35b9399dca"}, 0x19) r1 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r1, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000240)={0x1d, r2}, 0x18) sendmsg$can_j1939(r1, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) [ 1042.966628][ T4798] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:30 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x414, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x3f00, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1043.101936][ T4804] dccp_invalid_packet: P.Data Offset(103) too large 10:02:30 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) accept4(r2, &(0x7f0000000000)=@phonet, &(0x7f00000000c0)=0x80, 0x80000) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:02:30 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x43e, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:30 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:30 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000068) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:30 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x100000005) r6 = socket(0xa, 0x1, 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f00000000c0)={r8}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=r8, &(0x7f00000000c0)=0x4) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f00000002c0)=ANY=[@ANYRES32=r9, @ANYBLOB="e900000071602e134ce34558035efd106d1400e7be2dae6ab85e303e6920dbc9b4e4e92b85cfd7c6576c492e8ace920ce623f1f0f44dd4bff27398c3ded7864a3816d0f039319a513af6a5b3332ff4343a9833bbfeddbee12b1282a0a3c36069d01e61b6b45821db0e8b1a45b284b91bfc3b03e0182aa878c065d0afe6428584dfb79c1a481c6b4312bbab9b7d68abe3ef6935fb98b01d43648c4a5c5430959a315f77c2a7fc942865cb4174f6046bc5cd192cab0d3608df5036011e55b1dc4c6c9b27a2e021ef65ea1291faeb604d9377a5289c20b115d2fd3914cfd7f8891d259391db8eb4bf52f3314ccb5c"], &(0x7f0000000100)=0xf1) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESOCT], 0xff45) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000000)) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:02:30 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0b") [ 1043.559285][ T27] audit: type=1804 audit(1585908150.747:1310): pid=4823 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/695/cgroup.controllers" dev="sda1" ino=15921 res=1 10:02:30 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1, 0x1000000000000, {0x0, 0xf0}}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) [ 1043.633268][ T27] audit: type=1804 audit(1585908150.787:1311): pid=4827 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir838524438/syzkaller.gUHpbg/912/cgroup.controllers" dev="sda1" ino=16193 res=1 10:02:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x4000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1043.741076][ T27] audit: type=1804 audit(1585908150.927:1312): pid=4830 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/771/cgroup.controllers" dev="sda1" ino=16081 res=1 [ 1043.776803][ T4835] vcan0: tx drop: invalid sa for name 0x0001000000000000 [ 1043.787782][ T4838] vcan0: tx drop: invalid sa for name 0x0001000000000000 [ 1043.829189][ T4839] secmark_tg_check: 1 callbacks suppressed [ 1043.829197][ T4839] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1043.830596][ T4823] __nla_validate_parse: 2 callbacks suppressed [ 1043.830605][ T4823] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1043.867085][ T4830] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:02:31 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x0, 0x3}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:31 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x0, {0x0, 0x0, 0x4}}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:02:31 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x4800, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:31 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x0, &(0x7f0000000b80)={&(0x7f0000000280)='*n\x00\x00\x00\x00\x00\x00\x00', 0x9}}, 0x0) 10:02:31 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) getsockname$llc(r2, &(0x7f0000000000), &(0x7f0000000040)=0x10) [ 1044.112766][ T4855] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:31 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x3, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1044.249676][ T27] audit: type=1804 audit(1585908151.437:1313): pid=4826 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/695/cgroup.controllers" dev="sda1" ino=15921 res=1 10:02:31 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x1000000f0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:31 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:02:31 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0b") 10:02:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x4a00, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:31 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) unshare(0x10000000) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) [ 1044.514964][ T27] audit: type=1804 audit(1585908151.707:1314): pid=4870 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/696/cgroup.controllers" dev="sda1" ino=16257 res=1 [ 1044.608606][ T4874] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1044.840593][ T4870] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1044.845191][ T4881] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:02:32 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x0, 0x4}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:32 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r3 = socket(0xa, 0x1, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000000c0)={r5}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000000c0)={r5, 0x48, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @in6={0xa, 0x4e24, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x8}, @in={0x2, 0x4e21, @remote}]}, &(0x7f0000000100)=0x10) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:02:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x4c00, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:32 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x4, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:32 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x1000001aa) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1045.242654][ T4899] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:32 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r3 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r3, 0x0, 0x83, &(0x7f0000000600)={'nat\x00', 0x0, 0x3, 0x79, [], 0x6, &(0x7f0000000500)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000580)=""/121}, &(0x7f0000000680)=0x78) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) recvmsg$can_j1939(r2, &(0x7f00000004c0)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/82, 0x52}, {&(0x7f0000000140)=""/110, 0x6e}, {&(0x7f00000002c0)=""/56, 0x38}, {&(0x7f0000000300)=""/215, 0xd7}, {&(0x7f0000000400)=""/25, 0x19}], 0x5}, 0x2001) bind$can_j1939(r4, &(0x7f0000000240)={0x1d, r1, 0x0, {0x0, 0x0, 0x1}}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:02:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x5002, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1045.324613][ T4895] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1045.358170][ T4897] dccp_invalid_packet: P.Data Offset(103) too large 10:02:32 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x5, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1045.529537][ T4914] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:32 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847") 10:02:32 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25f0fef7ffffff0a", 0x9}}, 0x4840) 10:02:32 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x1000001fe) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:32 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0900000000000000030000000000000006000000010001000a000000000000006e8e0000000000000300000000000000020000000000000000000000000000000000000000000000011800000000000000000000000000000100000000000000080000000000000006000000000000000000000000000000000000000000000001080000000000000000000000000000ffffffff000000000000feffffff00000100000000000000000000000000000000000000000000000208000000000000000000000000000009000000000000003d00000000000000b00800000000000000000000000000000000000000000000040000000000000000000000000000000300000b960000000500000000000000ff07000000000000000000000000000000000000000000000810000000000000000000000000000001000000000000000700000000000000090000000000000000000000000000000000000000000000000c000000000000000000000000000003000000000000004000000000000000ff0f000000000000000000000000000000000000000000000233000000000000000000000000000003000000000000000100000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000010400000000000006000000000000000000000000000000000000000000000000130000000000000000000000000000ffff000000000000afc9000000000000080000000000000000000000000000000000000000000000830a00"/592]) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) ioctl$int_in(r3, 0x5421, &(0x7f0000000080)=0x200) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000200)=@gcm_256={{0x304}, "b208000400", "b8d5e8382b7cb1d009000000b7a139c44100000200", 'dCe#', "b1034b903a64f865"}, 0x38) sendto$inet6(r3, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) r4 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r4, r2, 0x0, 0x100000001) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000040)) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f00000000c0)=""/195, &(0x7f0000000000)=0xc3) socket$inet6_dccp(0xa, 0x6, 0x0) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r5}, 0x18) [ 1046.060438][ T4920] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1046.077830][ T4923] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:02:33 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x0, 0x5}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:33 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x6, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x5801, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1046.342906][ T4941] dccp_invalid_packet: P.Data Offset(103) too large [ 1046.344531][ T4940] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:33 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x7, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:33 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847") 10:02:33 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000300) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x5c00, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:34 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r4 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0x44, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0xfffffffffffffeff}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1e}, @NBD_ATTR_SERVER_FLAGS={0xc}]}, 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x804) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x6c, r4, 0x800, 0x70bd25, 0x25dfdbff, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x9}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xfffffffffffffff8}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x2}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x46}, @NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x22}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") pwritev(r2, &(0x7f0000000400)=[{&(0x7f00000000c0)="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", 0xfd}, {}, {&(0x7f0000000bc0)="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", 0x1000}, {&(0x7f0000000040)="62c47c50e0cda55c209020d35a1ad8e820af6867aeac96d883a4", 0x1a}, {&(0x7f00000002c0)="6bd4fa8f2de2f5156b23a1a1a44b098ebd9aff9adb5dee672788f124b40c6daaf7fb546ba4938ef09bc50641f449cf439c", 0x31}, {&(0x7f0000000300)="cc61c04bac811268e689ea48dab078c3569de5b926074bd0cc90b4aa08b2d9205206c75e0cbf98a358b8fe26b3827dd62575fbbf13a0a76203379b43fa27f0529194ca4d36f23e2d338b54f51dc4013f5a213b9d752e73a489251b3fa008c90ebbd94bc80c7181a1ca90c562376bd593d6dd65eb9ee413aacac62492626a34fbce1c8fae39805934e41edda1f3f95a1325bb8cb23a9d2c9a629ca5f579ed2c6b7466198eb46f50b6c657b0d6c7f664ecb24d7dc74b99af78fe07f06026bc1b6d018640be72807d5cba8a4b9c1623115e7bd5928fc466e59893d4a7cbbe21237e31", 0xe1}], 0x6, 0x3) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) [ 1047.119560][ T4958] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1047.180332][ T4946] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1047.189913][ T4949] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:02:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x6000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:34 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000000), 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r2}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) ioctl$SIOCRSGL2CALL(r3, 0x89e5, &(0x7f0000000040)=@bcast) 10:02:34 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1047.365115][ T4966] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:34 executing program 0: setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$nfc_llcp(r1, &(0x7f0000000400)={&(0x7f00000000c0)={0x27, 0x1, 0x1, 0x5, 0x80, 0x3, "3d685b0ebaed06aaf38bea68210f47d23f2a369b9628510e237f5345eccb2e872640ce77b20398a44ab29dd553285734b4544855713b9bf2a493ff15fb2137", 0x33}, 0x60, &(0x7f00000002c0)=[{&(0x7f0000000bc0)="ddff4facfe3d0486d28ab6e90d9f5aa025453f719067283223df83f495b9021a0ef14aafeabdc7ee2921e6f2abcc5fa25443181a1854bcf1e5daaebb8d175d1a553ead28631f5bc52136676c8e6c3822be6949e96de7dcdef04b2a7207f3ae661df29863fb19b5da467ca7848f562c8533deeeb8ce4844211c7f1a0e5f99095616c4f48d9952a884ac6b6b968185bf5bcee645993f4ca09dcb97438c04a46f5c7433b3523c5b05bc0fb7d423649fd4fbb1bff0e6b3272aea3a15a273a6fc66cbf9f870f67c54b206c13f54329122e0179ee2e1800a26fc1a73953ac317096b6d28b71530e3b8e3e09e58eb647c7fad56eff17108e167169f21f41ef835dd757e02fd8eb9786da60b1639ecbd6c2643cc60eeb8d9f3dc8c8e9eee8c2f05e0580d98d961848e3ebab7f666d94950defc94d13216d8ecf0655f2f59c43f0874aa72210ce91104688e37ac558f367a5eb62c572bc297cd672c35a844b69b205b33fc0b3720822e65a2b3d04756de39766e54fa4ab8c730d31df4a0735c471ecd6c604edd7bd1872cdda52515a2ed506c59278edfd9308dab0b6d7de6e356b8b4d51957c48954a61343ee97d3b520aebb95c20a9ed6191f26f6c87b83df0dfbcb2d28d9828a4cdbb40c0c537f1ce51f52f91047f99d44df22605b91b58de2b1c4f0c42a657a148b72ab8b29a3ea1d418e0a233ba26c2604b797026e85a34d19119c9905a64089705d3b236197ea8e0055ddd42abb7ac594b5d50219d026f26760b22e3481fdffac3306c32a3416dd3d2960ab5284a48f0bb47f892ea86a71ee9a919969245b6e0da144adb4a1945f31ac08a9871c2d20377c08949a3e781edb18b6932ca6d8c0d5d1eefebf5f2dc33a7bfc59424aa9b1e95797c592533bec973b917d4545faa285f7c24716866608137e6fc1a367f79426441ec280d4d13005ae86af653c073d50e9712da3e45371c2f1d79382a0aef73c83f2333ac245bd145d21b3b4a302d233d5003d4423076e6427516006c73b589520d6288c6d8e7c7f29a90fd43b87369787a70dc7fc4b0e68711fbfab6ffeba612b1076236c30efc2b1eb7e57eff5a9820974a6b942a807edee0d4e59f68cf4b09a487639040a918b6620d6cc9ab1f61946bc96416d02b8154777501116020826a94e795865f72ee7a996886268b48848ef941ee11a0de7f19bf1808bdb2c3dd5234066a2d39ac93da62b0ba716d6a68ddd881ece86fbe5451fe51681e480cc9c62608cec4c8e33a492899433a3cf37f0a40e8e2c6c9d8ccb94cf62b05b1ee692ea56f1a0dac66e7cbdf091cd8d78fcfcb47bcb180f0a4b8ebbdadedb28d4d5a47c1f1a715a7f73cdf6ede3caa322dd5cde36c37b90a07e3383b21cfe6d6a32a551c9a1b0a16a253cd1889f3e8299c38572c5fc3e2f5bdee8d85038efae6c14e2a2f524f3aa5204c33d8b778335c4a5cea41aa849d88ddfaa5774f51d2e0914cf78d1f0299850a3d31a16e6d1e34368a9bca69cf555e92ae4847668cf6adf91197aa24d4bcf50b47c060ca1b58b2a8d7bd235771d428239bdf1cdd12acf8fb840dff103a3846727f98d35f627cc649d9b1147a2fd8d629a1e1a7b56c621dc6a5b63e0a1eef5796245f74d1a987fe42d00a3258bc00329cc5c043edb18d733dbec6f2d3d3796dd8b265c2e39870cc92b87d6980b92353af71b856778adfbadaf7804491609912ee664454f0684b3e9aaa7937ade799f1dbaefc950302e74550c34f4a4c916b77d38b9c500f761f80fef2a6898df2817a97ea4ac922c063617bf07a43546d00f5f608c6f87b674f6ebbcfe53d09909461c15f59bd00e18312c0029c1d8546b8f96a13ccb0a29981f003de9d0b516143007b5cb247b1dad0c3cd8887fe5330a83d268538e934ba356a17619c087694997deb8259cc5b711b4468bb98b4858e44d3144eba87025c11f7811c2b585ab464b8c541606db8eedb3c01537e48780a6081fed013ff047f07818f5b018f9220ff1ae8eaabd475f309a870bd64e1c7ef0b8311175f28ca044cd5f7bca808d0e57457dce2718ddb914b34a9f4fc83d3bde2cff779e46900e8e83a13b8d0022189c05767305495cd1ea0580850c081f672a08d2c14d785e83d3fdab45b14282d035b44348cc8927b15380dea1da805939baee86263b943d5fb97e321374826f4d56da5aee1c674d62df49cc90381d6d41f388bae90ce37e9bb13b0e88df5f8453e50c0dca24eee708960352a68eb27166b87e56448653c3b9a046cfc24a4e7c23626562bb41a4c682f9106b83190fe57b149c9ba2f5b01449edd55a1530d4349231712cdc9c5f9e8d53ca33478a94a5af4496ef5f6f2cecad72301b6ad2de807dd69033037277a7c0b2d0093170536545f15fa62b94b75ffdea5b2802dd0cc639c172f2ee0243c4b770d486a05bbc843193bf6c775c5d0f04857951e5b0966a3ac840c71e91199c57306aedfd9f6da2110e1667bb6a5364f551cf3280283293df6b54d42ec58b53775b07d897b5de7fb96713406aa5fac2aebd1dab6678728bec6ff4e6a1aba30cea5a672eaa18bd9879de84c1be336b6dd216c8f37323b3fce6e11143a9b25d13ac0f0747437c83299b0a6344c78f24e64900a5f37c0e27929a7e62fdfaf0187fcaf0b706d76680944c33c1c6ef2ac95b3b79e5cc6ad7e9a8eec130b2913dc6bf2c7a19d683d60929a022c71269a7a68937ad54071d1840abbadf4c4bba83eb4a9ab9af09a4e9b7118a01a8f9879105c34b16544623f1f8bdafdcd018cbc85a6e70b231e6e18e2664aa87f3b7dd97736885d7e8e64855e068ca7c1f13827d38ecfcb7468e88c938161143e72ec85d82618dcf48609e15998fb203bca51279b2b2958fd8da09cf45b083989d654a21522c9844bb83a31843edd7ffe5e2678282b4d66207bcfa2eb5ae6a196e6b84e73cb29a6efca3bbab3bd6357e55f8c608903d58d7964e007b431a27eeb3d2912110e1e7a9bb4df885ff535f4f4eac1150b7d63acadf47cdfd68614c880489398e2d78394922cb7a5ad5ceeb278eafe256772c3b8445760588442b9c777c1abe74bb62716789a1b5e35a5c0fac2f9137588faf1f3a00fb96cf8aa763383690d20e47a5eae1897154f265db73ef63633a2b5888bc5b82d76032d673d24b78720d7cdca35b460c4617b6c3b9961bb4cf533d3501bc500a3070ddfb90ac616c7e83af6ae55e2dd3b0616649b5eca276eba0400542135dd979d1f27bde8111a9e83ac9d8b09df0b8dbb816957f71f58a8c688de50a9c6dcb5bde609c7480966b5c3fc591863a50b3ed6d9199f076abe18cfd9d8493e2055cf942294e4de44ce511631a6d858e270a1777320e23857bc3e2981d75883cee825202d705b9bb7290b8510c136593577545bf408955d0416ea535dc9b18d3a077cce337f34ead6fe84de34ec34a420378b999b8842b0cadba25cc1b88677178afcc1e380df56772f0f7215c3fd9afc52d7c09be622425c5363180eb8d1195a1e760d7d487b20e35b6538d04879302a228ecaf49dbc43502fd09afd33b081e751c901d20df63db5d2e1d77f9c66caf11572848b188b570f8ad26016ef9049f0d36779a1978d4b6959bfd7da603515967a3fc6ac9af2abb512975b094384862cfd79a6ade7b3f0764ad6723dcf66be1855314b1bfc867f1a0aaeed977b18d3e80df3cb6a5a7aa335ed9a9ea7ffe11632b66fa0edbb90050a1f1f88a15cd0215660214e6bce292bb22e10d03eb490dccf872266b45c4dcb8a055f83ad4c0eac89b14707375eef36e3fadf28d718e3687cf4433781f0e28cd0268af55738b1b22d9517835ddd2ac1ac0804c47ddfd70112dc5a8521d8c6c45b61e0148d83279a38f0dfb7a721fafac294e6fbfae63c75ab76d61baada272d99de598a90530c21748182e74f375773bb11dbc7e6b35ac70a816d274787dee0f0bef667507a9e6a6af0ceef7d258ebeea6887f344913e4e5287f8a6a00f4ebc41af8d629d52fc0addb3f042f413d817634c437f28d37948f6e16ef502d97115bbb3300a558ddb3bbecb5c3f1ac4f74c85d1e2d9e435d10bb123040a2005b944daa4a79eaf0c2126f3da437ed8aba3b12fa892bc162c56af3cd42ba2b7b3c548846ae4a9be9f5e67a9853508608ba457223fc94bdcc5bfa3a7c8881010d65659e4fcbaa901105713be3c8865dc66cf275b313cbc9c3f919432cf0c8aa44005828dea31869bc65395f947fc87f58d647dfd66f700d5c3ec6d019d4cc3b03c7f0f01bce844b5ac73768d2845099adfc4fe2c1eac8e76d4f73c58f02b2e6f91f8124f6d7e9d807d3a7251f75350b816ee561000210c2b4e058acd42b16ac5af77db124d7096bc25aa886cd88565ff1b203217a6d86dab1693162d5c8ee4d0a057384743e730b2e955609acfe330f2f91726e8ad8abf96cc48cc51314fe757962bf6d7684209c9748fc1df28aca591bd41229e8a8c720ed411b7a13390f019cb4758c3c6f3ac0f9ab273aca67ad98a6bb43b935add1269254d76bceac050f4e6fabe51c12d60b6f5a997a1ab83f27a9b899c378f9b62a8f23689ca2ded76116c7bc9466ab9de096c50f804541d6858dd6bc7a09eba604b3ca3232d1baeb0e44348fe734cea944ce460761e58a48422af7362f9d0e5bf5da914e06ac05fc6fa7d6c9524a70403c7289714c1708378fb9a53a42a4431ec7d577e5d4ebc8c75398edb39b7f014be9f42e84e8b9cfa689cb09a4a6009397b7ce8ab55ff32e430402638ba00612178c0a73817a7a033ce2c2814125a130bcdf41db06fe207e73ab8d1ea17d5ef04eb2a3526b3bd2010cd0cd655065f5f6b969af7c2e249c7cf4ca4e06982d22bfd29d4faeeef7b91769503f1e2ba9507362c7f78e3a9650bab8db30b716feed35532a03450fc321929eb15ec33809044ab019697f15acab5a5b40833d05440ef2e3a6eca193a541d9cb621b51d9b71e926cffa601b8dcc3ff6d52c1e25e0229538790f99a45cb852140f3c889a7b3e4c98b769fc98183ea678c55a78f9685fb489e6dfa4ccc31cf3262c3dc9a4b7d65153a03358ccc9e3de0b27b9012cd18e5bdacda2d0fd67954b3481f2ae0cd890af00fa728bbff9ebc860ba950bcfabf7584dff27e06f287e443c8f00152464c8acefa84dc7e39117c2cea350244a638fc8b09c4b2e8002673558af419727fa1806fb30392fcff3f67e8ad66c84b16753dff617cc35802fbadf3dce57c5128139ba99983068110c4bfa8647356b2a39fe7c47e905d4e97e69584c9e86ca225a1d7982fbfee900b23d71f0718131d30ae8d24e64862659d073675b476159566ededd512d1e7081ba6df51db681691de1526585366aace3b83447098130d059b93b0fb7a19e4d10613788b308f62746fc4c5bad5fad039449b3b298e350d41530e7fb1722d9163e96e10a794798a992eb22803f6d0c8450d12e0136540514c8dd7048cc160a56041a7333fc18c54b9c80258b434deed2f1de42904c835a087eb98ced079ba83cd0c9e8ce0b36fc7cba490bdca0b6d0d4eca5019b4bca4db3d864b7b1b53de3c98bdebee3aa922e2cd0effa2cb58a83117e4b90e0d7279706cf11608d4b6300678b8f52af0f8de4907f22e26b235a4f788fc8bc8fc8b27f597d744d0a4a4c06b634cb865082f56070d208492254ad21259ccdd24e4f0d47d648326a4468d96c4908939842a3f027daec389adc073627fd6ffd5bd49a21a86423a2e8988204bf4e5648c3dfd4bc8ca240388c803257d5ff49427a5163d8e539a7d730e76d43e7ae5e6ef", 0x1000}, {&(0x7f0000000140)="12731285610162585fcf24092a48db09b0ca63504c4595029dd28121d0114d662722b04fb62a8b1cbbfaea2bc7c874338a16fb6caccbe32ad4a76fb2074bb55a70c4360de7e06c3e740650ffdcd0efa48f0a13480aa6f7cd41f9daec0731cc304cb6a8556c0827f681ee", 0x6a}], 0x2, &(0x7f0000000300)={0x100, 0x1, 0x0, "b272806330b6a03f1ab7c2356a2c669ae8c73536f8009c38f2e1f93090547cfd20371222309979b7b3318d6c9bd0d4d0d96857a86c8abf0eeffd49c986aea0f34529ddce119933c5d24ab82094d9c02505c351eec68c372d6110bc54a5c15e3246437ae3909bbf7e22bcf8cc29e122f308197d998ccbfa1007e5b76bf0c6db20f7c3130d6a176c46ac2e51ac84490a98f5be36a317ed1c64aa0d7fa8da00733713343f68ebcae87b23432041a97976a598fbad6b0e056640aa60732dbd43ffb1a4a5008c00fda352f90495fe86bf3166a0defb0eeb0aee31daeb67b218458c98539acfd7efbf0f8464682e2838c670"}, 0x100, 0x4080}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) sendmsg$can_j1939(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)="afce249160b08014dfa5084f58492102fa3714a24a0242968d7dec62a9c4d5211147088d4560ed81b22d74570ccaf2e74bef23b8a4ef665878fab712df17d785516c4bed5af4b2cba841384cba2411aae294dc35c9caa7bbb728253f5ac346d4e71067eb3b02df1b63bb094ab290a46eb2c697c885e1e5443003405eecc58c7458006bcad56dd9483b513681acb52faaed51268b83c72d517247a4ad8a2d6b63ad33aa76b31668c088311d3eca627cd802", 0xb1}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000240)={0x1d, r2}, 0x18) sendmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000)='NLBL_CALIPSO\x00') 10:02:34 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x0, 0x6}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:34 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847") [ 1047.568251][ T27] kauditd_printk_skb: 10 callbacks suppressed [ 1047.568266][ T27] audit: type=1804 audit(1585908154.757:1325): pid=4950 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/699/cgroup.controllers" dev="sda1" ino=16417 res=1 10:02:34 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x9, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x6002, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:34 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000500) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1047.745067][ T4987] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1047.746162][ T4984] dccp_invalid_packet: P.Data Offset(103) too large 10:02:35 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000100)='memory.current\x00', 0x0, 0x0) ioctl$SIOCSIFMTU(r4, 0x8922, &(0x7f0000000140)={'macvlan0\x00', 0x7ff}) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f0000000640)={'veth0_to_team\x00', {0x2, 0x4e23, @local}}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r5, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r5, 0x8983, &(0x7f0000000000)={0x8, 'bond_slave_0\x00', {}, 0x304}) [ 1047.783457][ T27] audit: type=1804 audit(1585908154.977:1326): pid=4982 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/775/cgroup.controllers" dev="sda1" ino=16209 res=1 10:02:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x6003, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1047.877562][ T27] audit: type=1804 audit(1585908155.067:1327): pid=4993 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/700/cgroup.controllers" dev="sda1" ino=16561 res=1 10:02:35 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0xa, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1048.016382][ T5000] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:35 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000700)='memory.current\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000740)={0x400}, 0x4) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1, 0xffffffffffffffff, {0x0, 0xf0}}, 0x18) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r5, r4, 0x0, 0x100000001) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r6, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r7, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r7, 0x0) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000000)) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0x0, {0x0, 0x0, 0x4}}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x8000) [ 1048.292507][ T27] audit: type=1804 audit(1585908155.487:1328): pid=5006 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir838524438/syzkaller.gUHpbg/927/cgroup.controllers" dev="sda1" ino=16417 res=1 [ 1048.323373][ T4982] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1048.368782][ T27] audit: type=1804 audit(1585908155.557:1329): pid=5006 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir838524438/syzkaller.gUHpbg/927/cgroup.controllers" dev="sda1" ino=16417 res=1 10:02:35 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="010000000000000024e411800b0001000672692f6cc1055a572a3033d3edf164676500001400028005000007b1c095e0af06366f0c748b080105000000d24d95130100"], 0x44}}, 0x0) sendmsg$can_j1939(r1, &(0x7f0000000300)={&(0x7f0000000040)={0x1d, r4, 0x1, {0x1, 0xf0, 0x2}, 0xfd}, 0x18, &(0x7f00000002c0)={&(0x7f00000000c0)="a7aad7ae3ad3eacb5244a9488690e916f0a64a0a97186bd39213ca6cd4b025f58cbae508f4724b632376ab7129339e5646194a1add5638080dfd6d163717d771096a527d9ebbe00e5e76bbce102d9298d926cda10fe7f04ce150f15d40b654b6c2a5bd9c92918567153ccddda733b592d5e611e7d8b5612038229b9cf07b1388304757130f22e0f9b9572ac3b08faca996ef4f6c7b8d1a267b2cede323cb1086cc1bdb66260f5676c7ae3fb17d54de8bdd0a972d4297529347803777c3181c7669053e5b1eb215", 0xc7}, 0x1, 0x0, 0x0, 0x44000}, 0x4c091) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r5}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:02:35 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a0") 10:02:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x6800, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1048.538821][ T27] audit: type=1804 audit(1585908155.727:1330): pid=4994 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/700/cgroup.controllers" dev="sda1" ino=16561 res=1 [ 1048.724811][ T27] audit: type=1804 audit(1585908155.917:1331): pid=5019 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/776/cgroup.controllers" dev="sda1" ino=16273 res=1 10:02:36 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x0, 0x7}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:36 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000600) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:36 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0xb, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x6803, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1048.962226][ T5030] secmark_tg_check: 1 callbacks suppressed [ 1048.962234][ T5030] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:36 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a0") [ 1048.994472][ T27] audit: type=1804 audit(1585908156.187:1332): pid=5028 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/701/cgroup.controllers" dev="sda1" ino=16705 res=1 [ 1049.086251][ T5028] __nla_validate_parse: 3 callbacks suppressed [ 1049.086261][ T5028] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:02:36 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0xf, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x6c00, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1049.244425][ T27] audit: type=1804 audit(1585908156.437:1333): pid=5040 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/777/cgroup.controllers" dev="sda1" ino=16177 res=1 [ 1049.319590][ T5046] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:36 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000700) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1049.449124][ T27] audit: type=1804 audit(1585908156.637:1334): pid=5031 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/701/cgroup.controllers" dev="sda1" ino=16705 res=1 10:02:36 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000440)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000400), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x4c, r3, 0x91bf9cd514ad9098, 0x3510, 0x25dfdbfc, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x18, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x521}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x32671e0b}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x20, 0x8, 0x0, 0x1, [{0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6ee387bb}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x76d474ba}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x26}]}]}]}, 0x4c}}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0xb4, r3, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x18, 0x8, 0x0, 0x1, [{0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x24ea663b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x28}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x84, 0x8, 0x0, 0x1, [{0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x93ed624}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x15124312}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x77}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x633535ff}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa7}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5834f5c8}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x57}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xab}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}]}, {0x4}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3130a0ee}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}]}, 0xb4}, 0x1, 0x0, 0x0, 0x80c0}, 0x40040) sendmsg$NLBL_CIPSOV4_C_LISTALL(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x90}, 0xc, &(0x7f0000000040)={&(0x7f00000002c0)={0x214, r3, 0x4, 0x70bd2a, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MLSCATLST={0x34, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2f53}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2af39e24}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x39f88e4a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x235d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4aae}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x34, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_MLSCATLST={0xb0, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x40b0051e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe95e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x783b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb959}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x469c8b26}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5aac4bbd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7acbe2ac}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1604}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2243}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2c83}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xf993969}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x62f}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3ca0}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x364c}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8f92}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x78d3c0ca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1c40}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe0fb}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1392e776}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x40, 0x8, 0x0, 0x1, [{0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xc716172}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xae}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbd}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2f317368}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x3c}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSCATLST={0x98, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6b9fe275}]}, {0x4c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1c8283ec}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8370}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x61f2e581}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1f065414}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1023}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7af0ed33}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x95af}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x56cc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x401507d2}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3b03b15a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7e80e109}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5acb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7f0b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x55bb3eb9}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x573f7e9f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf3d6}]}]}]}, 0x214}, 0x1, 0x0, 0x0, 0x40}, 0x4001) [ 1049.670331][ T5040] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1049.870062][ T5048] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:02:37 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x10, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x7000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:37 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a0") [ 1050.127841][ T5065] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1050.641078][ T5066] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:02:38 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000900) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:38 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r5, @ANYBLOB="0100000000000000240012800b000100627269640100000014000280050019005aee17925e649f166c6cc508a78289a9000000000800050000000100"], 0x44}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r8, @ANYBLOB="0100000000000000240012800b00010062726964676500001400028005001900000000000800050000000100"], 0x44}}, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000880)={&(0x7f0000001bc0)={0x7a8, 0x0, 0x200, 0x70bd2c, 0x25dfdbfd, {}, [{{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xc31}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x260, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0xad}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x7ff}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x80000001}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8}, {0x138, 0x2, 0x0, 0x1, [{0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0xc, 0x4, [{0x6, 0xf8, 0x9, 0x3}]}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0xc693}}, {0x8, 0x6, r1}}}]}}, {{0x8}, {0xf0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8}}, {0x8, 0x6, r1}}}]}}, {{0x8}, {0xfc, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x80}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0xe8, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r5}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r1}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r1}}}]}}]}, 0x7a8}, 0x1, 0x0, 0x0, 0x80}, 0x4000090) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000007c0)={0xffffffffffffffff}) bind$can_j1939(r9, &(0x7f0000000240)={0x1d, r1}, 0x57) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:02:38 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x0, 0x8}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x7400, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:38 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x11, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x2c01, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1051.015000][ T5077] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:38 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) setsockopt$llc_int(r2, 0x10c, 0x2, &(0x7f0000000000)=0x2, 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r4, r3, 0x0, 0x100000001) sendmsg$can_j1939(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)="51914e8e1e19801e31d0ea324f47f64baf4d978fe4fdc5633f618727fbf408903e8a412aee36deba102a8a3e48ee03e142849e274b1a5e243cef773fcf1aba371c9e033b0271beb23853bbb79634a3a371", 0x51}, 0x1, 0x0, 0x0, 0x2000c844}, 0x800) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) [ 1051.089278][ T5085] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1051.182023][ T5084] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:02:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x7402, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:38 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x12, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1051.437972][ T5105] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:38 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000a00) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:39 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1, 0x0, {0x0, 0x1}, 0xfe}, 0x18) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r5, r4, 0x0, 0x100000001) readv(r4, &(0x7f00000004c0)=[{&(0x7f0000000100)=""/166, 0xa6}, {&(0x7f00000002c0)=""/127, 0x7f}, {&(0x7f0000000340)=""/195, 0xc3}, {&(0x7f0000000440)=""/118, 0x76}], 0x4) sendfile(r3, r2, 0x0, 0x100000001) r6 = openat$cgroup_ro(r2, &(0x7f0000000040)='memory.swap.current\x00', 0x0, 0x0) sendmsg$can_j1939(r6, &(0x7f00000000c0)={&(0x7f0000000b40), 0x18, &(0x7f0000000000)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 10:02:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x7a00, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1051.942092][ T5109] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:02:39 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x13, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:39 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan1\x00', 0x0}) r3 = accept(r0, 0x0, &(0x7f00000000c0)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r5 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)={0x24, r4, 0x11, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_WIPHY_RETRY_SHORT={0x5, 0x3d, 0x5}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x34, r4, 0x20, 0x70bd28, 0x25dfdbfc, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r1}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1f}}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @local}]}, 0x34}, 0x1, 0x0, 0x0, 0x20040800}, 0x20048045) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, r2}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0a8090000ba4e", 0x9}, 0x1, 0x0, 0x0, 0x4080}, 0x22008000) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r7, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r7, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x89e4, &(0x7f0000000340)="2f28c4f2b2ff4c") getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r7, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 1052.200700][ T5125] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:39 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x0, 0x11}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:39 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) setsockopt$llc_int(r2, 0x10c, 0x2, &(0x7f0000000000)=0x2, 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r4, r3, 0x0, 0x100000001) sendmsg$can_j1939(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)="51914e8e1e19801e31d0ea324f47f64baf4d978fe4fdc5633f618727fbf408903e8a412aee36deba102a8a3e48ee03e142849e274b1a5e243cef773fcf1aba371c9e033b0271beb23853bbb79634a3a371", 0x51}, 0x1, 0x0, 0x0, 0x2000c844}, 0x800) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:02:39 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) r2 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f00000002c0)={@x25={0x9, @remote={[], 0x2}}, {&(0x7f00000000c0)=""/35, 0x23}, &(0x7f0000000100), 0x20}, 0xa0) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x100000001) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r6, 0x4, 0x70bd27, 0x25dfdbfe, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x48000}, 0x80) r7 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r7, r4, 0x0, 0x100000001) getsockopt$inet_sctp6_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000380)={0x0, 0x8001, 0x4, 0x49d7, 0x1ff, 0x6, 0xfffd, 0x3, {0x0, @in6={{0xa, 0x4e24, 0x4cb7, @dev={0xfe, 0x80, [], 0x33}, 0x401}}, 0x49c, 0x8, 0x6, 0x0, 0x9}}, &(0x7f0000000140)=0xb0) ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f0000000000)={'vlan1\x00', 0x5}) sendfile(r0, r0, &(0x7f0000000040)=0x5, 0x1) 10:02:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x7c01, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:39 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000b00) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:39 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x14, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1052.734170][ T5140] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x8800, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1052.802591][ T27] kauditd_printk_skb: 6 callbacks suppressed [ 1052.802637][ T27] audit: type=1804 audit(1585908159.988:1341): pid=5138 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir838524438/syzkaller.gUHpbg/933/cgroup.controllers" dev="sda1" ino=16944 res=1 [ 1052.827955][ T5148] dccp_invalid_packet: P.Data Offset(103) too large [ 1052.908809][ T27] audit: type=1804 audit(1585908160.038:1342): pid=5146 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/705/cgroup.controllers" dev="sda1" ino=16946 res=1 [ 1052.937714][ T27] audit: type=1804 audit(1585908160.088:1343): pid=5137 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/781/cgroup.controllers" dev="sda1" ino=16939 res=1 [ 1052.998984][ T27] audit: type=1804 audit(1585908160.178:1344): pid=5145 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir838524438/syzkaller.gUHpbg/933/cgroup.controllers" dev="sda1" ino=16944 res=1 [ 1053.021563][ T5152] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1053.040783][ T5139] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1053.062423][ T27] audit: type=1804 audit(1585908160.248:1345): pid=5138 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir838524438/syzkaller.gUHpbg/933/cgroup.controllers" dev="sda1" ino=16944 res=1 10:02:40 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0x0, {0x0, 0x0, 0x2}, 0xfd}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) socket(0x10, 0x5, 0x8) 10:02:40 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0xf0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:40 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000b35) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1053.304159][ T27] audit: type=1804 audit(1585908160.488:1346): pid=5146 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/705/cgroup.controllers" dev="sda1" ino=16946 res=1 [ 1053.486039][ T27] audit: type=1804 audit(1585908160.668:1347): pid=5160 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/706/cgroup.controllers" dev="sda1" ino=16945 res=1 10:02:40 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) setsockopt$llc_int(r2, 0x10c, 0x2, &(0x7f0000000000)=0x2, 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r4, r3, 0x0, 0x100000001) sendmsg$can_j1939(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)="51914e8e1e19801e31d0ea324f47f64baf4d978fe4fdc5633f618727fbf408903e8a412aee36deba102a8a3e48ee03e142849e274b1a5e243cef773fcf1aba371c9e033b0271beb23853bbb79634a3a371", 0x51}, 0x1, 0x0, 0x0, 0x2000c844}, 0x800) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:02:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x8a02, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1053.690219][ T5168] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1053.729594][ T5160] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1053.781944][ T27] audit: type=1804 audit(1585908160.968:1348): pid=5166 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/782/cgroup.controllers" dev="sda1" ino=16939 res=1 10:02:41 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x300, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x9400, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:41 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000c00) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:41 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) socket$netlink(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:41 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x0, 0x21}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) [ 1054.428540][ T5185] secmark_tg_check: 1 callbacks suppressed [ 1054.428547][ T5185] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1054.455706][ C0] vcan0: j1939_tp_rxtimer: 0x000000001e7d710a: rx timeout, send abort [ 1054.464345][ C0] vcan0: j1939_xtp_rx_abort_one: 0x000000001e7d710a: 0x20000: (3) A timeout occurred and this is the connection abort to close the session. [ 1054.483829][ T27] audit: type=1804 audit(1585908161.668:1349): pid=5188 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/707/cgroup.controllers" dev="sda1" ino=16951 res=1 10:02:41 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x500, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1054.553370][ T27] audit: type=1804 audit(1585908161.738:1350): pid=5184 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/783/cgroup.controllers" dev="sda1" ino=16952 res=1 [ 1054.584738][ T5183] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:02:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x9800, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1054.819252][ T5184] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1054.947053][ T5203] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x9e03, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:42 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x600, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:42 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000d00) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:42 executing program 5 (fault-call:6 fault-nth:0): sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1055.742997][ C0] vcan0: j1939_tp_rxtimer: 0x00000000aaa4cef7: rx timeout, send abort [ 1055.751394][ C0] vcan0: j1939_xtp_rx_abort_one: 0x00000000aaa4cef7: 0x20000: (3) A timeout occurred and this is the connection abort to close the session. 10:02:43 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x0, 0x48}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:43 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f0000000000)=0xffffffff) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="110000000000000000000200000008000300", @ANYRES32=0x0, @ANYBLOB="05050000000c0000"], 0x24}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000440)=0xe8) sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=ANY=[@ANYBLOB="19", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf251d0000000400238008000100ffffffff08000100030000000c009900090000000000000008000300", @ANYRES32=r1, @ANYBLOB="08000100010000000c00990062f4ffff01000000"], 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x20000080) setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000040)=0x7ff, 0x4) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r4, r3, 0x0, 0x100000001) sendmsg$IPCTNL_MSG_CT_GET_DYING(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x6, 0x1, 0x801, 0x0, 0x0, {0x5, 0x0, 0x5}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x24048840}, 0x90) bind$netlink(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x0, 0x25dfdbfd, 0x1}, 0xc) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r2}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) pipe(&(0x7f0000000880)={0xffffffffffffffff}) sendmsg$inet_sctp(r5, &(0x7f0000000dc0)={&(0x7f00000008c0)=@in={0x2, 0x4e21, @multicast1}, 0x10, &(0x7f0000000d40)=[{&(0x7f0000000900)="15d0257a52003950844fd0e3b33a377c991952315d982e6fbada1a09913a1bbc174eb12fbd44813540bbb3c58a4bdc23", 0x30}, {&(0x7f0000000940)="88169e7bbac3d41e56a48c14d7687666dee3381fdfb6587a720426afdfeab198fbf52189b419df2d0913eb09eccdc2ff8d20b27f8d3e16f8fa19bad37b3737593d5de4e22502884e04a2d94bd866a6f58d4bca7a3a0cf390b8529a39790acc8e1cdbd0ce1b2f05b6bce232dd7649701653a8c9eb14ef31937efcc9b3e5c1153f04a7335bdcab845329e608034f3cf5026ca12c816384c0a9eb599eb41e950d56e7386dcd9b51e88c4782a3ec79e5ecd064dbb6c42ff693f88f2f14daedefc11a10e19623347d44c5191368f4b3547cfd545d0f846672333ccfe9e95c35502b987d3acc0eb6", 0xe5}, {&(0x7f0000000a40)="4e95f923b0863a6ac986c33b12a06823daa27a85a24b2506f60bdfa0565b4fd4fbf48fb61d1458cb523f8c1067abd8bd21c4f5465131acedda2482600a4a0c42d53c32bf9dd14c2d7e1d031cfd54f84c3bbefd0b19d8cddb35e8563341ee", 0x5e}, {&(0x7f0000000ac0)="788a7959c06542becccdb537e65c3d538e16c81ac2585a2d72d1e350f61e5d4de9f2b378a36bbde5348909d690dccc1c8e7dd06d1d5ae1aa48a237aed24c73715d0b160115acf2b0171b22ac002f5ad4461bbb002b338d38a288939fa6c9e0ba5649723cc896f18ec0e2", 0x6a}, {&(0x7f0000000bc0)="6cff87baea10c84a442599df20d0e9cfc5fbfcdc3e5b9acabd770947b735d60e95d6d8", 0x23}, {&(0x7f0000000c00)}, {&(0x7f0000000c40)="cbe55a268dc66c49fca2718f387453ec", 0x10}, {&(0x7f0000000c80)="610d19d05e53b3db3d38ad73e19d5d57eb6d0ba236f302f125617f5eed9c49cd1474035f9690ba0a492baa47d92f2015f6c30df3f0b5c615da255b2157273fdb5dd2e5591af0f51073ae59b6247d8b174b72d6d76e01de75d9b923678afc98796a8c73fca1b51cb655aee4cda6ee595c4887790c05b2e1dfa2ee319028373e6592b09aa87190627398d19e2a3c66b306", 0x90}], 0x8, 0x0, 0x0, 0x4000040}, 0x4000000) 10:02:43 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0xa) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r3, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0xc000}, 0x48c0) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1, 0x3, {0x2, 0xff}, 0xd5a435f51b1c01ad}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) sendmsg$IPSET_CMD_GET_BYNAME(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0xe, 0x6, 0x401, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000005}, 0x24040000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r6, r5, 0x0, 0x100000001) getsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r7, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r7, 0x0) ioctl$SIOCGETLINKNAME(r7, 0x89e0, &(0x7f0000000380)={0x3}) [ 1055.943193][ T5224] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1055.982861][ T5219] FAULT_INJECTION: forcing a failure. [ 1055.982861][ T5219] name failslab, interval 1, probability 0, space 0, times 0 [ 1056.002931][ T5230] vcan0: tx drop: invalid sa for name 0x0000000000000003 [ 1056.007521][ T5219] CPU: 1 PID: 5219 Comm: syz-executor.5 Not tainted 5.6.0-syzkaller #0 [ 1056.018298][ T5219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1056.028361][ T5219] Call Trace: [ 1056.031674][ T5219] dump_stack+0x188/0x20d [ 1056.036036][ T5219] should_fail.cold+0x5/0xa [ 1056.040555][ T5219] ? lock_downgrade+0x840/0x840 [ 1056.045430][ T5219] ? fault_create_debugfs_attr+0x140/0x140 [ 1056.051258][ T5219] should_failslab+0x5/0xf [ 1056.055691][ T5219] kmem_cache_alloc_trace+0x2d0/0x7d0 [ 1056.061084][ T5219] ? aa_file_perm+0x5be/0x14d0 [ 1056.065968][ T5219] alloc_pipe_info+0x10a/0x4f0 [ 1056.070756][ T5219] splice_direct_to_actor+0x777/0x980 [ 1056.076156][ T5219] ? apparmor_path_rmdir+0x30/0x30 [ 1056.081295][ T5219] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1056.086857][ T5219] ? lock_downgrade+0x840/0x840 [ 1056.091738][ T5219] ? do_splice_to+0x160/0x160 [ 1056.096432][ T5219] ? security_file_permission+0x8a/0x380 [ 1056.102124][ T5219] do_splice_direct+0x1b4/0x280 [ 1056.107002][ T5219] ? splice_direct_to_actor+0x980/0x980 [ 1056.112567][ T5219] ? security_file_permission+0x8a/0x380 [ 1056.118219][ T5219] do_sendfile+0x555/0xc50 [ 1056.122663][ T5219] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1056.127978][ T5219] ? wait_for_completion+0x270/0x270 [ 1056.133273][ T5219] ? __sb_end_write+0x101/0x1d0 [ 1056.138131][ T5219] ? vfs_write+0x161/0x5d0 [ 1056.142558][ T5219] __x64_sys_sendfile64+0x1cc/0x210 [ 1056.147764][ T5219] ? ksys_write+0x1a5/0x250 [ 1056.152272][ T5219] ? __ia32_sys_sendfile+0x220/0x220 [ 1056.157563][ T5219] ? __ia32_sys_clock_settime+0x260/0x260 [ 1056.163289][ T5219] ? trace_hardirqs_off_caller+0x55/0x230 [ 1056.169024][ T5219] do_syscall_64+0xf6/0x7d0 [ 1056.173539][ T5219] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1056.179437][ T5219] RIP: 0033:0x45c849 [ 1056.183339][ T5219] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1056.202946][ T5219] RSP: 002b:00007fef141bfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1056.211368][ T5219] RAX: ffffffffffffffda RBX: 00007fef141c06d4 RCX: 000000000045c849 [ 1056.219351][ T5219] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 1056.227363][ T5219] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1056.235345][ T5219] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000006 [ 1056.243415][ T5219] R13: 00000000000008d4 R14: 00000000004cb786 R15: 0000000000000000 [ 1056.279521][ T5215] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:02:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0xa801, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:43 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x700, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:43 executing program 5 (fault-call:6 fault-nth:1): sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1056.560140][ T5245] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1056.615463][ T5244] FAULT_INJECTION: forcing a failure. [ 1056.615463][ T5244] name failslab, interval 1, probability 0, space 0, times 0 [ 1056.640034][ T5244] CPU: 1 PID: 5244 Comm: syz-executor.5 Not tainted 5.6.0-syzkaller #0 [ 1056.648424][ T5244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1056.658498][ T5244] Call Trace: [ 1056.661804][ T5244] dump_stack+0x188/0x20d [ 1056.666154][ T5244] should_fail.cold+0x5/0xa [ 1056.670666][ T5244] ? lock_downgrade+0x840/0x840 [ 1056.675536][ T5244] ? fault_create_debugfs_attr+0x140/0x140 [ 1056.681366][ T5244] should_failslab+0x5/0xf [ 1056.685792][ T5244] __kmalloc+0x2d9/0x7a0 [ 1056.690043][ T5244] ? kmem_cache_alloc_trace+0x390/0x7d0 [ 1056.695601][ T5244] ? alloc_pipe_info+0x1e0/0x4f0 [ 1056.700543][ T5244] ? aa_file_perm+0x5be/0x14d0 [ 1056.705408][ T5244] alloc_pipe_info+0x1e0/0x4f0 [ 1056.710188][ T5244] splice_direct_to_actor+0x777/0x980 10:02:43 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000e00) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1056.715577][ T5244] ? apparmor_path_rmdir+0x30/0x30 [ 1056.720880][ T5244] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1056.726430][ T5244] ? lock_downgrade+0x840/0x840 [ 1056.731300][ T5244] ? do_splice_to+0x160/0x160 [ 1056.735985][ T5244] ? security_file_permission+0x8a/0x380 [ 1056.741638][ T5244] do_splice_direct+0x1b4/0x280 [ 1056.747804][ T5244] ? splice_direct_to_actor+0x980/0x980 [ 1056.753367][ T5244] ? security_file_permission+0x8a/0x380 [ 1056.759014][ T5244] do_sendfile+0x555/0xc50 [ 1056.763453][ T5244] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1056.768755][ T5244] ? wait_for_completion+0x270/0x270 [ 1056.774053][ T5244] ? __sb_end_write+0x101/0x1d0 [ 1056.778915][ T5244] ? vfs_write+0x161/0x5d0 [ 1056.783361][ T5244] __x64_sys_sendfile64+0x1cc/0x210 [ 1056.788569][ T5244] ? ksys_write+0x1a5/0x250 [ 1056.793086][ T5244] ? __ia32_sys_sendfile+0x220/0x220 [ 1056.798382][ T5244] ? __ia32_sys_clock_settime+0x260/0x260 [ 1056.804114][ T5244] ? trace_hardirqs_off_caller+0x55/0x230 [ 1056.809851][ T5244] do_syscall_64+0xf6/0x7d0 [ 1056.814371][ T5244] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1056.820270][ T5244] RIP: 0033:0x45c849 [ 1056.824171][ T5244] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1056.843925][ T5244] RSP: 002b:00007fef141bfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1056.852447][ T5244] RAX: ffffffffffffffda RBX: 00007fef141c06d4 RCX: 000000000045c849 [ 1056.860433][ T5244] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 1056.868411][ T5244] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1056.876389][ T5244] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000006 [ 1056.884372][ T5244] R13: 00000000000008d4 R14: 00000000004cb786 R15: 0000000000000001 10:02:44 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) getpeername$llc(r2, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000040)=0x10) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r3, &(0x7f00000000c0)=0x20, 0x3172) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r6, @ANYBLOB="010000000000000089bce8ecee3b494ef2e96b255e4d240012800b00010062726964676500001400028027e7261a000000000800050000000100"], 0x44}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', r6}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r7}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:02:44 executing program 5 (fault-call:6 fault-nth:2): sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1057.099807][ T5248] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:02:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0xb602, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:44 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x900, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1057.197896][ T5254] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1057.285044][ T5262] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1057.317432][ T5261] FAULT_INJECTION: forcing a failure. [ 1057.317432][ T5261] name failslab, interval 1, probability 0, space 0, times 0 [ 1057.338513][ T5261] CPU: 1 PID: 5261 Comm: syz-executor.5 Not tainted 5.6.0-syzkaller #0 [ 1057.346785][ T5261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1057.356847][ T5261] Call Trace: [ 1057.360129][ T5261] dump_stack+0x188/0x20d [ 1057.364443][ T5261] should_fail.cold+0x5/0xa [ 1057.368942][ T5261] ? fault_create_debugfs_attr+0x140/0x140 [ 1057.374779][ T5261] should_failslab+0x5/0xf [ 1057.379223][ T5261] kmem_cache_alloc_trace+0x2d0/0x7d0 [ 1057.384618][ T5261] iomap_dio_rw+0x27f/0x1140 [ 1057.389225][ T5261] ? lock_release+0x800/0x800 [ 1057.393922][ T5261] ? iomap_dio_complete+0x770/0x770 [ 1057.399145][ T5261] ? down_read+0x110/0x420 [ 1057.403577][ T5261] ? down_read_killable+0x460/0x460 [ 1057.408776][ T5261] ? ext4_file_read_iter+0x444/0x600 [ 1057.414046][ T5261] ext4_file_read_iter+0x444/0x600 [ 1057.419289][ T5261] generic_file_splice_read+0x479/0x780 [ 1057.424849][ T5261] ? fsnotify_first_mark+0x200/0x200 [ 1057.430142][ T5261] ? add_to_pipe+0x3a0/0x3a0 [ 1057.434781][ T5261] ? add_to_pipe+0x3a0/0x3a0 [ 1057.439371][ T5261] do_splice_to+0x114/0x160 [ 1057.443871][ T5261] splice_direct_to_actor+0x307/0x980 [ 1057.449324][ T5261] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1057.454872][ T5261] ? do_splice_to+0x160/0x160 [ 1057.459543][ T5261] ? security_file_permission+0x8a/0x380 [ 1057.465175][ T5261] do_splice_direct+0x1b4/0x280 [ 1057.470021][ T5261] ? splice_direct_to_actor+0x980/0x980 [ 1057.475611][ T5261] ? security_file_permission+0x8a/0x380 [ 1057.481258][ T5261] do_sendfile+0x555/0xc50 [ 1057.485698][ T5261] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1057.490997][ T5261] ? wait_for_completion+0x270/0x270 [ 1057.496290][ T5261] ? __sb_end_write+0x101/0x1d0 [ 1057.501232][ T5261] ? vfs_write+0x161/0x5d0 [ 1057.505657][ T5261] __x64_sys_sendfile64+0x1cc/0x210 [ 1057.510850][ T5261] ? ksys_write+0x1a5/0x250 [ 1057.515349][ T5261] ? __ia32_sys_sendfile+0x220/0x220 [ 1057.520633][ T5261] ? __ia32_sys_clock_settime+0x260/0x260 [ 1057.526386][ T5261] ? trace_hardirqs_off_caller+0x55/0x230 [ 1057.532129][ T5261] do_syscall_64+0xf6/0x7d0 [ 1057.536638][ T5261] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1057.542522][ T5261] RIP: 0033:0x45c849 [ 1057.546404][ T5261] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1057.565999][ T5261] RSP: 002b:00007fef141bfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1057.574573][ T5261] RAX: ffffffffffffffda RBX: 00007fef141c06d4 RCX: 000000000045c849 10:02:44 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x100000001) setsockopt$TIPC_DEST_DROPPABLE(r2, 0x10f, 0x81, &(0x7f0000000000)=0x4, 0x4) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) [ 1057.582533][ T5261] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 1057.590498][ T5261] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1057.598498][ T5261] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000006 [ 1057.606457][ T5261] R13: 00000000000008d4 R14: 00000000004cb786 R15: 0000000000000002 10:02:45 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x0, 0x4c}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:45 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000f00) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0xbe01, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:45 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1, 0x0, {}, 0x6b819ddc4be6359e}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) setsockopt$inet_int(r2, 0x0, 0xf, &(0x7f0000000000), 0x4) 10:02:45 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x92b, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:45 executing program 5 (fault-call:6 fault-nth:3): sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1058.080966][ T5282] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0xc203, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1058.183221][ T27] kauditd_printk_skb: 10 callbacks suppressed [ 1058.183241][ T27] audit: type=1804 audit(1585908165.368:1361): pid=5283 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/787/cgroup.controllers" dev="sda1" ino=16986 res=1 [ 1058.217967][ T5283] FAULT_INJECTION: forcing a failure. [ 1058.217967][ T5283] name failslab, interval 1, probability 0, space 0, times 0 [ 1058.232367][ T5283] CPU: 0 PID: 5283 Comm: syz-executor.5 Not tainted 5.6.0-syzkaller #0 [ 1058.240624][ T5283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1058.250819][ T5283] Call Trace: [ 1058.254132][ T5283] dump_stack+0x188/0x20d [ 1058.258485][ T5283] should_fail.cold+0x5/0xa [ 1058.263057][ T5283] ? fault_create_debugfs_attr+0x140/0x140 [ 1058.268889][ T5283] should_failslab+0x5/0xf [ 1058.273323][ T5283] kmem_cache_alloc+0x29b/0x740 [ 1058.276026][ T27] audit: type=1804 audit(1585908165.428:1362): pid=5290 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/710/cgroup.controllers" dev="sda1" ino=16988 res=1 [ 1058.278182][ T5283] ? ext4_ext_index_trans_blocks+0x12f/0x160 [ 1058.278207][ T5283] ext4_init_io_end+0x23/0x170 [ 1058.278225][ T5283] ext4_writepages+0x928/0x30c0 [ 1058.278239][ T5283] ? mark_lock+0x12b/0xf10 [ 1058.278263][ T5283] ? is_bpf_text_address+0xcb/0x160 [ 1058.326297][ T5298] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1058.327647][ T5283] ? __kernel_text_address+0x9/0x30 [ 1058.327667][ T5283] ? unwind_get_return_address+0x5a/0xa0 [ 1058.327697][ T5283] ? ext4_mark_inode_dirty+0x900/0x900 [ 1058.327719][ T5283] ? profile_setup+0x172/0x320 [ 1058.356675][ T5283] ? mark_held_locks+0xe0/0xe0 [ 1058.361456][ T5283] ? save_stack+0x4c/0x80 [ 1058.365846][ T5283] ? save_stack+0x1a/0x80 [ 1058.370329][ T5283] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 1058.376134][ T5283] ? kmem_cache_alloc_trace+0x153/0x7d0 [ 1058.381750][ T5283] ? iomap_dio_rw+0x27f/0x1140 [ 1058.386508][ T5283] ? ext4_mark_inode_dirty+0x900/0x900 [ 1058.392037][ T5283] ? do_writepages+0xfa/0x2a0 [ 1058.396710][ T5283] do_writepages+0xfa/0x2a0 [ 1058.401904][ T5283] ? page_writeback_cpu_online+0x10/0x10 [ 1058.407531][ T5283] ? do_raw_spin_lock+0x129/0x2e0 [ 1058.412553][ T5283] ? do_raw_spin_unlock+0x171/0x260 [ 1058.417749][ T5283] ? _raw_spin_unlock+0x24/0x40 [ 1058.422589][ T5283] ? wbc_attach_and_unlock_inode+0x60a/0x9c0 [ 1058.428557][ T5283] __filemap_fdatawrite_range+0x2aa/0x390 [ 1058.434264][ T5283] ? delete_from_page_cache_batch+0xec0/0xec0 [ 1058.440345][ T5283] ? kmem_cache_alloc_trace+0x390/0x7d0 [ 1058.445909][ T5283] filemap_write_and_wait_range+0xf7/0x1e0 [ 1058.451716][ T5283] iomap_dio_rw+0x623/0x1140 [ 1058.456303][ T5283] ? iomap_dio_complete+0x770/0x770 [ 1058.461505][ T5283] ? down_read+0x110/0x420 [ 1058.466011][ T5283] ? down_read_killable+0x460/0x460 [ 1058.471205][ T5283] ? ext4_file_read_iter+0x444/0x600 [ 1058.476500][ T5283] ext4_file_read_iter+0x444/0x600 [ 1058.481618][ T5283] generic_file_splice_read+0x479/0x780 [ 1058.487272][ T5283] ? fsnotify_first_mark+0x200/0x200 [ 1058.492586][ T5283] ? add_to_pipe+0x3a0/0x3a0 [ 1058.497274][ T5283] ? add_to_pipe+0x3a0/0x3a0 [ 1058.501984][ T5283] do_splice_to+0x114/0x160 [ 1058.506969][ T5283] splice_direct_to_actor+0x307/0x980 [ 1058.512365][ T5283] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1058.518008][ T5283] ? do_splice_to+0x160/0x160 [ 1058.522688][ T5283] ? security_file_permission+0x8a/0x380 [ 1058.528323][ T5283] do_splice_direct+0x1b4/0x280 [ 1058.533171][ T5283] ? splice_direct_to_actor+0x980/0x980 [ 1058.538735][ T5283] ? security_file_permission+0x8a/0x380 [ 1058.544393][ T5283] do_sendfile+0x555/0xc50 [ 1058.549279][ T5283] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1058.554566][ T5283] ? wait_for_completion+0x270/0x270 [ 1058.559848][ T5283] ? __sb_end_write+0x101/0x1d0 [ 1058.564797][ T5283] ? vfs_write+0x161/0x5d0 [ 1058.569225][ T5283] __x64_sys_sendfile64+0x1cc/0x210 [ 1058.574412][ T5283] ? ksys_write+0x1a5/0x250 [ 1058.578902][ T5283] ? __ia32_sys_sendfile+0x220/0x220 [ 1058.584188][ T5283] ? __ia32_sys_clock_settime+0x260/0x260 [ 1058.590017][ T5283] ? trace_hardirqs_off_caller+0x55/0x230 [ 1058.595732][ T5283] do_syscall_64+0xf6/0x7d0 [ 1058.600333][ T5283] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1058.606311][ T5283] RIP: 0033:0x45c849 [ 1058.610199][ T5283] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1058.629799][ T5283] RSP: 002b:00007fef141bfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1058.638212][ T5283] RAX: ffffffffffffffda RBX: 00007fef141c06d4 RCX: 000000000045c849 [ 1058.646179][ T5283] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 1058.654170][ T5283] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1058.662148][ T5283] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000006 [ 1058.670117][ T5283] R13: 00000000000008d4 R14: 00000000004cb786 R15: 0000000000000003 [ 1058.727107][ T5283] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:02:45 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100001100) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0xc402, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:46 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0xa00, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:46 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1058.942243][ T27] audit: type=1804 audit(1585908166.128:1363): pid=5306 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/711/cgroup.controllers" dev="sda1" ino=16994 res=1 [ 1058.982243][ T5311] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1059.164074][ T5306] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1059.185041][ T27] audit: type=1804 audit(1585908166.368:1364): pid=5312 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/788/cgroup.controllers" dev="sda1" ino=16986 res=1 10:02:46 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0xb00, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1059.374790][ C1] vcan0: j1939_tp_rxtimer: 0x0000000061b08bc3: rx timeout, send abort [ 1059.384029][ C1] vcan0: j1939_xtp_rx_abort_one: 0x0000000061b08bc3: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 1059.410866][ T5312] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1059.674542][ T27] audit: type=1804 audit(1585908166.858:1365): pid=5308 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/711/cgroup.controllers" dev="sda1" ino=16994 res=1 10:02:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0xc801, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:46 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100001f00) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:46 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x0, 0x60}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) [ 1059.852690][ T5331] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1059.866895][ T5330] dccp_invalid_packet: P.Data Offset(103) too large [ 1059.875022][ T27] audit: type=1804 audit(1585908167.068:1366): pid=5329 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/712/cgroup.controllers" dev="sda1" ino=16994 res=1 [ 1060.017239][ T5329] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1060.275278][ T27] audit: type=1804 audit(1585908167.458:1367): pid=5334 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/712/cgroup.controllers" dev="sda1" ino=16994 res=1 [ 1060.310061][ T27] audit: type=1804 audit(1585908167.458:1368): pid=5329 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/712/cgroup.controllers" dev="sda1" ino=16994 res=1 10:02:47 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r5, r4, 0x0, 0x100000001) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r8, @ANYBLOB="0100000000000000240012800b00010062726964676500001400028005001900000000000800050000000100"], 0x44}}, 0x0) bind$can_j1939(r4, &(0x7f00000000c0)={0x1d, r8, 0x3, {0x1, 0x0, 0x1}, 0xfe}, 0x18) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r9, @ANYBLOB="0100000000000000240012800b00010062726964676500001400028005001900000000000800050000000100"], 0x44}}, 0x0) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, r9}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:02:47 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0xf00, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:47 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000002) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:47 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x0, 0x68}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0xce00, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:47 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100004000) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1060.711006][ C1] vcan0: j1939_tp_rxtimer: 0x000000007c0905c1: rx timeout, send abort [ 1060.719541][ C1] vcan0: j1939_xtp_rx_abort_one: 0x000000007c0905c1: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 1060.829817][ T5343] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0xd600, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1060.950873][ T27] audit: type=1804 audit(1585908168.138:1369): pid=5347 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/789/cgroup.controllers" dev="sda1" ino=17008 res=1 [ 1060.996863][ T27] audit: type=1804 audit(1585908168.138:1370): pid=5353 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/713/cgroup.controllers" dev="sda1" ino=17009 res=1 10:02:48 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0xffe, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1061.054258][ T5347] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1061.076895][ T5346] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1061.077354][ T5367] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:48 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100004100) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:48 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f00000002c0)="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", 0x229}}, 0x2000c8a0) socket$inet6_sctp(0xa, 0x1, 0x84) 10:02:48 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000003) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:48 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) [ 1061.645924][ T5377] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:02:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0xe000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:48 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x1100, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:49 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r5, @ANYBLOB="0100000000000000240012800b00010062726964676500001400028005001900000000000800050000000100"], 0x44}}, 0x0) sendmsg$can_j1939(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x1d, r5, 0x3, {0x2, 0x0, 0x3}, 0x1}, 0x18, &(0x7f0000000040)={&(0x7f00000000c0)="14421e6a712d13c5c38a138249f6fb22c390fbeaf8d5bf78bde1077361fe8649844798918555e4142091d5241fb260378266b29f224e5021bf720c7048a210d99fe84637b14f3466a6f77a5e0853e1d306c0f0e37473bd2d65dc41c1bc397476dfdfe2228beff1f5b17fb9d537d0a5173e69e424fd8e1ce3fc1d4ecb180e1ade83756b2506fd5c92bfd9d7d4717294f872391ee096d2844d0585", 0x9a}, 0x1, 0x0, 0x0, 0x3acc235ff65579ca}, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r6}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0x0, {0x2}}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x8040) [ 1061.895069][ T5395] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1062.094001][ T5383] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:02:49 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x0, 0x6c}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:49 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100008100) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:49 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000004) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:49 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x1d, 0x0, 0x0, {0x0, 0xf0}}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x20008000) 10:02:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0xe001, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:49 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x1200, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1062.428524][ T5406] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1062.463202][ T5414] dccp_invalid_packet: P.Data Offset(103) too large [ 1062.485534][ T5418] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0xe400, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:49 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x10000d400) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1062.731576][ T5423] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0xe401, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1062.968623][ T5417] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1062.984805][ T5427] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:02:50 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x1300, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1063.128954][ T5436] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0xe600, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:50 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000005) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1063.247208][ T27] kauditd_printk_skb: 11 callbacks suppressed [ 1063.247220][ T27] audit: type=1804 audit(1585908170.429:1382): pid=5420 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/791/cgroup.controllers" dev="sda1" ino=17011 res=1 10:02:50 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x0, 0x74}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) [ 1063.314362][ T5440] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0xea00, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:50 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x1400, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1063.476432][ T27] audit: type=1804 audit(1585908170.659:1383): pid=5444 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/792/cgroup.controllers" dev="sda1" ino=17001 res=1 [ 1063.505531][ T5444] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1063.520775][ T5448] dccp_invalid_packet: P.Data Offset(103) too large [ 1063.572377][ T5453] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1063.593894][ T27] audit: type=1804 audit(1585908170.779:1384): pid=5428 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/716/cgroup.controllers" dev="sda1" ino=17013 res=1 [ 1063.691617][ C1] vcan0: j1939_tp_rxtimer: 0x0000000092bc1ad2: rx timeout, send abort [ 1063.700074][ C1] vcan0: j1939_xtp_rx_abort_one: 0x0000000092bc1ad2: 0x0f000: (3) A timeout occurred and this is the connection abort to close the session. 10:02:52 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x2b09, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:52 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x10000d500) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0xf400, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:52 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000006) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:52 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x0, 0x7a}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:52 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = accept4(r1, &(0x7f0000000100)=@hci, &(0x7f0000000180)=0x80, 0x80000) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) getsockopt$inet_int(r4, 0x0, 0x6, &(0x7f00000000c0), &(0x7f0000000500)=0x4) close(r3) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000540)=ANY=[@ANYBLOB="64ee1f00b85229eee939e94a6edf9ad5038c1e580010", @ANYRES16=r5, @ANYBLOB="53e60000000000000000370000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000800030000000000faff040000000000"], 0x44}}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r2, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x148, r5, 0x200, 0x70bd27, 0x25dfdbfd, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}}]}, 0x148}, 0x1, 0x0, 0x0, 0x8014}, 0x10) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r6}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a2501fe94d9665114", 0x9}}, 0x0) [ 1064.972839][ C0] vcan0: j1939_tp_rxtimer: 0x0000000049e894c2: rx timeout, send abort [ 1064.981491][ C0] vcan0: j1939_xtp_rx_abort_one: 0x0000000049e894c2: 0x0f000: (3) A timeout occurred and this is the connection abort to close the session. [ 1065.165778][ T27] audit: type=1804 audit(1585908172.349:1385): pid=5469 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/717/cgroup.controllers" dev="sda1" ino=17025 res=1 [ 1065.204054][ T5480] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1065.220938][ T27] audit: type=1804 audit(1585908172.409:1386): pid=5468 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/793/cgroup.controllers" dev="sda1" ino=17030 res=1 10:02:52 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x3f00, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1065.332949][ T5469] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1065.349118][ T5468] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:02:52 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) setsockopt$SO_J1939_ERRQUEUE(r1, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r3}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0x0, {0x0, 0x0, 0x2}}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) [ 1065.846112][ T27] audit: type=1804 audit(1585908173.029:1387): pid=5476 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/717/cgroup.controllers" dev="sda1" ino=17025 res=1 10:02:53 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x10000f000) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0xfc01, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:53 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000007) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1065.953706][ T27] audit: type=1804 audit(1585908173.029:1388): pid=5469 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/717/cgroup.controllers" dev="sda1" ino=17025 res=1 [ 1066.034970][ T27] audit: type=1804 audit(1585908173.079:1389): pid=5478 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/793/cgroup.controllers" dev="sda1" ino=17030 res=1 [ 1066.101168][ T5496] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1066.115095][ T5493] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:02:53 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x4000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1066.130943][ T27] audit: type=1804 audit(1585908173.279:1390): pid=5493 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/718/cgroup.controllers" dev="sda1" ino=17027 res=1 [ 1066.180931][ T5495] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:02:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x12000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1066.218907][ T27] audit: type=1804 audit(1585908173.319:1391): pid=5495 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/794/cgroup.controllers" dev="sda1" ino=17030 res=1 10:02:53 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x10000fff0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1066.439266][ T5506] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1066.818533][ T5508] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:02:54 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x0, 0x300}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x3ffff, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:54 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x8100, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1066.893905][ C0] vcan0: j1939_tp_rxtimer: 0x0000000018949d2b: rx timeout, send abort [ 1066.903394][ C0] vcan0: j1939_xtp_rx_abort_one: 0x0000000018949d2b: 0x20000: (3) A timeout occurred and this is the connection abort to close the session. 10:02:54 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000008) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:54 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/151, 0x97}, {&(0x7f00000002c0)=""/232, 0xe8}, {&(0x7f00000003c0)=""/224, 0xe0}, {&(0x7f00000004c0)=""/230, 0xe6}, {&(0x7f00000005c0)=""/254, 0xfe}], 0x5, &(0x7f0000000bc0)=""/4096, 0x1000}, 0x0) sendfile(r4, r3, 0x0, 0x100000001) ioctl$PPPIOCGNPMODE(r3, 0xc008744c, &(0x7f00000000c0)={0x80fb, 0x3}) ioctl$SIOCGETLINKNAME(r2, 0x89e0, &(0x7f0000000000)={0x4, 0x1}) [ 1067.009128][ T5518] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x40000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1067.175918][ T5521] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:02:54 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0xf000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:54 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x17ffffff2) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1067.308502][ T5535] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:54 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000009) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:54 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x100000001) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000040)=0x81) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r5, r4, 0x0, 0x100000001) bind$can_j1939(r4, &(0x7f0000000000)={0x1d, r1, 0x1, {0x0, 0xff}}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:02:54 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r4 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="230900000000000000000100000005000700000000000800090000000000060002000100000008000a000000000008001700", @ANYRES32=r4, @ANYBLOB="d8cbc2127eacc3ea6619d396a405e00481bebd980b197dee8b01a1f8828721e7eb6f0f90f11720fe428ba84b59829741c8a38b26e72f29f97a17e8c1b09afc6fcc0fe455e4c84cd69b10646eb4a048b52eb3644d346bcbe3f7094a6bc51def1e8fb082708b7bf2b90cba03511df9676bbb6ec4f60d2d2dc57a5ce4f8ff6e6a8fa9102538a5bbbbc4ab8c0ca7"], 0x3c}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x14, r3, 0x400, 0x70bd27, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x10000}, 0x2404c814) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0x0, {0x2}}, 0x18, &(0x7f0000000b80)={&(0x7f00000000c0)="438e941052b3ab7114d5d8f264f5907a64fd7476a31a60278f5d5c8dac96104fe3bd51d3045a836bab969ce60629988e427b3e01252980ce8a6f835c96d626961d470c83800e7a4c10f0a9705e9be10e2d17f03a8e3270e6a3893a028ee5fdbd8747193f829bad968cfda4e97dc03f5b91957bcbe2a9f0254009385e895530f0c4ef48ef1039345c2baab48bf92a2f306db8c9bb56f76d9431ef74c57c290e387a3abd42995ab8ed4d5a0b361a6308544249a1de65", 0xb5}}, 0x40040) 10:02:54 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x100000001) getpeername$unix(r2, &(0x7f0000000000), &(0x7f00000000c0)=0x6e) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) [ 1067.869438][ T5539] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1067.879547][ T5544] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:02:55 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x0, 0x500}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:55 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = socket(0xa, 0x5, 0x2) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r2}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) getsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 10:02:55 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0xfe0f, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x100000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:55 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x17ffffff8) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:55 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x10000000a) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1068.341161][ T5578] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1068.366885][ T27] kauditd_printk_skb: 8 callbacks suppressed [ 1068.366899][ T27] audit: type=1804 audit(1585908175.549:1400): pid=5569 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/721/cgroup.controllers" dev="sda1" ino=17032 res=1 [ 1068.418002][ T27] audit: type=1804 audit(1585908175.599:1401): pid=5573 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/797/cgroup.controllers" dev="sda1" ino=17035 res=1 [ 1068.472223][ T5569] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1068.488079][ T5573] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:02:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x200100, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:55 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0xfeff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:55 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x28011, 0xffffffffffffffff, 0x1ac3000) connect$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x1, 0x6, 0x1, 0xd5, "78a75e6e0bb2ed060af1d1d5d2b0867189459d2a3729da150cee3257fe11fcd97b720ad97f76eee711ea1259e610a45943bdf71b8dfde0b91e9732a56f990e", 0x34}, 0x60) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r2}, 0x18) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r6, r5, 0x0, 0x100000001) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0xb00000000065808, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r8, r7, 0x0, 0x100000001) getsockopt$sock_timeval(r6, 0x1, 0x43, &(0x7f00000000c0), &(0x7f0000000000)=0x10) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) [ 1068.781268][ T5597] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1068.823330][ T27] audit: type=1804 audit(1585908176.009:1402): pid=5580 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/797/cgroup.controllers" dev="sda1" ino=17035 res=1 10:02:56 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x10000000b) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1068.914058][ T27] audit: type=1804 audit(1585908176.039:1403): pid=5573 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/797/cgroup.controllers" dev="sda1" ino=17035 res=1 [ 1069.057818][ T27] audit: type=1804 audit(1585908176.239:1404): pid=5576 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/721/cgroup.controllers" dev="sda1" ino=17032 res=1 10:02:56 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x17ffffff9) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1069.180748][ T27] audit: type=1804 audit(1585908176.369:1405): pid=5603 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/798/cgroup.controllers" dev="sda1" ino=17023 res=1 [ 1069.299338][ T27] audit: type=1804 audit(1585908176.489:1406): pid=5606 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/722/cgroup.controllers" dev="sda1" ino=15763 res=1 [ 1069.366331][ T27] audit: type=1804 audit(1585908176.549:1407): pid=5600 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir838524438/syzkaller.gUHpbg/952/cgroup.controllers" dev="sda1" ino=17036 res=1 10:02:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x1000000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1069.581622][ T27] audit: type=1804 audit(1585908176.769:1408): pid=5600 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir838524438/syzkaller.gUHpbg/952/cgroup.controllers" dev="sda1" ino=17036 res=1 [ 1069.610397][ T5582] dccp_invalid_packet: P.Data Offset(103) too large [ 1069.688695][ T27] audit: type=1800 audit(1585908176.819:1409): pid=5598 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=17036 res=0 [ 1069.762377][ T5615] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:57 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x0, 0x600}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:57 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0xff0f, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:57 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x10000000c) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:57 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x17ffffffe) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:57 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000940)={{0x14}, [@NFT_MSG_NEWRULE={0x14}, @NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x201, 0x0, 0x0, {0xa}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWCHAIN={0x20, 0x3, 0xa, 0x401, 0x0, 0x0, {0xa}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x7c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r5, r4, 0x0, 0x100000001) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r7 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)={0x24, r6, 0x11, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r8}, @NL80211_ATTR_WIPHY_RETRY_SHORT={0x5, 0x3d, 0x5}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_KEY(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2c000000fa40d16aab6db08dffe4674a3f47cf161c46e9fd7736a3c1c0efc4395b24eb1174c655e4eb77ee0686e65537013f28de28fe2d3b15f3183e6ad911972b7c37737a6388b74cc5aa5a7c5f03efff2725c6e49f60391dbc116eab8f69c0c5345464882eb68f5b5a3c866c51bd5d0808e4e8d4280af98d42", @ANYRES16=r6, @ANYBLOB="10002dbd7000ffdbdf250a0000000a000600794622de041a0000090007008e41681b8d000000"], 0x2c}, 0x1, 0x0, 0x0, 0x8010}, 0x801) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r3}, 0x18) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r9, 0x0, 0x83, &(0x7f00000002c0)={'broute\x00', 0x0, 0x3, 0xc, [], 0x8, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000040)=""/12}, &(0x7f0000000180)=0x78) ioctl$PPPIOCATTCHAN(r4, 0x40047438, &(0x7f0000000440)=0x2) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:02:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x2000000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1070.385610][ T5631] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x3000000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:57 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0xfffe, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1070.471444][ T5624] __nla_validate_parse: 2 callbacks suppressed [ 1070.471453][ T5624] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1070.491755][ T5628] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1070.639861][ T5646] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:58 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x10000000f) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:58 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00'}) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8010, r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r3 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000640)='NLBL_CALIPSO\x00') r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) r5 = accept4$bt_l2cap(r4, 0x0, &(0x7f0000000180), 0x81000) ioctl$int_in(r5, 0x5452, &(0x7f0000000240)=0x100) sendmsg$NLBL_CALIPSO_C_LIST(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x44, r3, 0x10, 0x70bd26, 0x0, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000085}, 0x0) sendmsg$NLBL_CALIPSO_C_LIST(r1, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x24, r3, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x4c0c0) r6 = socket$l2tp6(0xa, 0x2, 0x73) connect$l2tp6(r6, &(0x7f00000002c0)={0xa, 0x0, 0x63, @ipv4={[], [], @empty}, 0x9, 0x3}, 0x20) 10:02:58 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x1fffff000) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1071.301626][ T5648] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:02:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x4000000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1071.474506][ T5664] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1071.552926][ T5657] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:02:59 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x0, 0x700}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:02:59 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x34000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:02:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x5000000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:02:59 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x1ffffff1f) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:59 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000010) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:02:59 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000100)=[@in={0x2, 0x4e22, @loopback}]}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f00000002c0)={r4, 0x9, 0xfd}, 0x8) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) r5 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSSL2CALL(r5, 0x89e2, &(0x7f00000000c0)=@bcast) [ 1072.246685][ T5682] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:59 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/120, 0x78}, {&(0x7f00000002c0)=""/246, 0xf6}, {&(0x7f00000003c0)=""/192, 0xc0}], 0x3, &(0x7f0000000480)=""/166, 0xa6}, 0x40000002) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0100000000000000240012800b0001006272696467656b99000014000280050019000000000008e105000000"], 0x44}}, 0x0) sendmsg$can_j1939(r1, &(0x7f0000000600)={&(0x7f0000000540)={0x1d, r4, 0x2, {0x0, 0x0, 0x3}}, 0x18, &(0x7f00000005c0)={&(0x7f0000000580)="5a43c285b2bea41efa7da539bbf383676d23aea6d81d", 0x16}, 0x1, 0x0, 0x0, 0x8000}, 0x4004) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r5}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(r0, 0x1, 0x53, &(0x7f0000000680)={0x7, 0x7, 0x4}, &(0x7f00000006c0)=0x28) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000640)) [ 1072.361433][ T5678] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1072.386435][ T5680] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:02:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x6000000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1072.406522][ T5694] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 10:02:59 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x400300, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1072.570633][ T5701] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:02:59 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000023) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:03:00 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x1fffffff0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1073.008737][ T5694] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 10:03:00 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0xf0ffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1073.192899][ T5706] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1073.208081][ T5708] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:03:00 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x0, 0xe80}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:03:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x7000000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:03:00 executing program 0: r0 = socket$inet(0x2, 0x3, 0x2) r1 = socket(0xa, 0x1, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0)={r3}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000003c0)={r3, 0x7}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000440)={r4, 0x2b, "8240028dc94427a0efe0780e6802ffa4ac03d52c0fbc92a43d86e4c7e49b2e69c9d8fca194c99e023af70b"}, &(0x7f0000000480)=0x33) r5 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r5, &(0x7f0000000240)={0x1d, r6}, 0x18) sendmsg$can_j1939(r5, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0x0, {0x2}}, 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:03:00 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x1000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1073.606388][ T5727] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1073.637532][ T27] kauditd_printk_skb: 19 callbacks suppressed 10:03:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x8010000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1073.637551][ T27] audit: type=1804 audit(1585908180.820:1429): pid=5709 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/802/cgroup.controllers" dev="sda1" ino=16273 res=1 10:03:00 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000025) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:03:00 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$sock_void(r2, 0x1, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0100000000000000240012800b000100620100640a6500001400028005001900000000000800050000000100"], 0x44}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r5, r4, 0x0, 0x100000001) getsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r7, r6, 0x0, 0x100000001) r8 = accept4$ax25(r6, &(0x7f0000000300)={{0x3, @bcast}, [@remote, @bcast, @remote, @default, @remote, @default, @remote, @rose]}, &(0x7f0000000380)=0x48, 0x80800) ioctl$sock_inet_SIOCGIFNETMASK(r8, 0x891b, &(0x7f00000003c0)={'erspan0\x00', {0x2, 0x4e22, @multicast1}}) bind$can_j1939(r0, &(0x7f00000000c0)={0x1d, r3, 0x0, {0x0, 0xff, 0x7}}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000000)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:03:00 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4300003f10e9136233bffaf7646d3affeba7001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1073.721108][ T27] audit: type=1804 audit(1585908180.860:1430): pid=5710 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/726/cgroup.controllers" dev="sda1" ino=16193 res=1 [ 1073.826181][ T5742] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1073.859579][ T5731] dccp_invalid_packet: P.Data Offset(103) too large 10:03:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0xe020000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:03:01 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x11cfdff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1073.901819][ T27] audit: type=1804 audit(1585908181.090:1431): pid=5740 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/727/cgroup.controllers" dev="sda1" ino=16289 res=1 10:03:01 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000000)=0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r3}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:03:01 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000068) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1074.084029][ T5759] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1074.249736][ T27] audit: type=1804 audit(1585908181.440:1432): pid=5762 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/804/cgroup.controllers" dev="sda1" ino=16388 res=1 [ 1074.604999][ T27] audit: type=1804 audit(1585908181.790:1433): pid=5764 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/804/cgroup.controllers" dev="sda1" ino=16388 res=1 [ 1074.632990][ T27] audit: type=1804 audit(1585908181.800:1434): pid=5762 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/804/cgroup.controllers" dev="sda1" ino=16388 res=1 10:03:02 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x0, 0x1100}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:03:02 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r3}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:03:02 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f0000000100)="080db5055eff7f0000758493b363c5ab3b1ab301ba04713c7fdfa348bfc5fe0bcfe847a071") 10:03:02 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x2000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:03:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x12010000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:03:02 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x1000000c0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1074.876426][ T5778] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:03:02 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) setsockopt$SO_J1939_ERRQUEUE(r1, 0x6b, 0x4, &(0x7f00000002c0)=0x1, 0x4) r3 = socket$netlink(0x10, 0x3, 0xa) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$IPSET_CMD_TEST(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="b00000000b0601020000000000000000070000050900020073797a30000000000900020073797a3200000000340007800c001940000000000365f38608001c40000003ff06001d40000600000900120073797a310000000006001d4000060000100008800c000780060004404e2300001400078008001c480000000205000700890000002c000880100007800c00028008000140ffffffff0c0007800780050007002e000000"], 0xb0}, 0x1, 0x0, 0x0, 0x4083}, 0x20000000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r4}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) [ 1074.962141][ T27] audit: type=1804 audit(1585908182.150:1435): pid=5777 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/805/cgroup.controllers" dev="sda1" ino=16561 res=1 10:03:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x14010000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1075.020616][ T27] audit: type=1804 audit(1585908182.210:1436): pid=5782 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/728/cgroup.controllers" dev="sda1" ino=16567 res=1 [ 1075.082853][ T5784] dccp_invalid_packet: P.Data Offset(103) too large [ 1075.092213][ T5796] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:03:02 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x3000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1075.274829][ T27] audit: type=1804 audit(1585908182.460:1437): pid=5785 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/805/cgroup.controllers" dev="sda1" ino=16561 res=1 10:03:02 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x1000000e0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:03:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x1c030000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1075.511799][ T5804] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1075.565865][ T27] audit: type=1804 audit(1585908182.750:1438): pid=5803 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/806/cgroup.controllers" dev="sda1" ino=16481 res=1 10:03:02 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1075.943851][ T5803] __nla_validate_parse: 3 callbacks suppressed [ 1075.943862][ T5803] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:03:03 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x0, 0x2000}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:03:03 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.stat\x00', 0x275a, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r5 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB='$\t\x00\x00', @ANYRES16=r4, @ANYBLOB="110000000000000000000200000008000300", @ANYRES32=r6, @ANYBLOB="05003d0005000000"], 0x24}}, 0x0) sendmsg$NL80211_CMD_START_AP(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r4, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@NL80211_ATTR_ACL_POLICY={0x8}, @NL80211_ATTR_ACL_POLICY={0x8, 0xa5, 0x1}, @NL80211_ATTR_PBSS={0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x801) sendfile(r3, r2, 0x0, 0x100000001) r7 = socket$netlink(0x10, 0x3, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:03:03 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x4000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:03:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x20000000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:03:03 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x1000000f0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:03:03 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0x44, r1, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0xfffffffffffffeff}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1e}, @NBD_ATTR_SERVER_FLAGS={0xc}]}, 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x804) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x100000001) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r5, r4, 0x0, 0x100000001) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r6, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, r1, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0x8, 0x1, r2}, {0x8, 0x1, r4}, {0x8, 0x1, r6}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r7}, 0x18) r8 = socket$netlink(0x10, 0x3, 0x0) ioctl(r8, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r8, 0x800c6613, &(0x7f0000000000)=@v1={0x0, @adiantum, 0x0, "04d742bcb516e242"}) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) [ 1076.612257][ T5825] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:03:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x20040000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1076.770772][ T5828] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1076.790291][ T5830] dccp_invalid_packet: P.Data Offset(103) too large [ 1076.790558][ T5839] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:03:04 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, &(0x7f0000000000)=0x200, 0x4) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:03:04 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x5000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:03:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x22030000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:03:04 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) r2 = syz_init_net_socket$ax25(0x3, 0x5, 0xcf) ioctl$SIOCAX25GETINFOOLD(r2, 0x89e9, &(0x7f0000000980)) 10:03:04 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x1000001fe) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1077.125690][ T5854] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1077.488175][ T5858] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:03:04 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x24, r2, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x28, r2, 0x400, 0x70bd28, 0x25dfdbfc, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x8884}, 0x4000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000000, 0x40010, r0, 0xdfbba000) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r4, r3, 0x0, 0x100000001) r5 = socket$key(0xf, 0x3, 0x2) mmap(&(0x7f0000329000/0x3000)=nil, 0x3000, 0x1000000, 0x810, r5, 0xd8981000) r6 = socket$netlink(0x10, 0x3, 0x0) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000240)="a52b0b7f245583330c16e17833768787424895abc08c635efccbd3a4a168bd392735dc3b3f1a64e419d26273a60a341e15d24df0fdf6f7beda3f4d80608e9b2fd2fa520795ca49f8131249257d5ea6dda0d526fd26d7f1c7690fbd31bfe68359dd21b6e1860b4d02945229d05d1ebf27ea91d8b9d7291eb8c9a29b421bf6b0c6166d73bcb86c02365b429e227ba20620b54a586d9e5d6325237a1a8742964d891d8d8da3fdf9be252179fc3b946acc011a3d84faacc3d3ab0123c91adac156d792eba5ce73b4f5e96b03200633897c2fb7a8fc887e0b4a01db1926c92eeb867815e6d4", &(0x7f0000000000)=""/35, 0x4}, 0x20) 10:03:04 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000000)) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:03:04 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x6000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:03:04 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x0, 0x2100}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:03:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x2c010000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1077.869454][ T5875] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:03:05 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) sendmsg$AUDIT_USER_AVC(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x5c, 0x453, 0x0, 0x70bd2b, 0x25dfdbfe, "891938532de3bf749e117e780cfc117a0d9f97118fc08c6ad3c24c1a2c03dd8b920387a54270c7233eff48c36bd3a7855c248764e47e16883824f977c1f744658f1fd23525cb254ad6a7f990", ["", "", "", "", "", "", "", "", ""]}, 0x5c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x3c, r3, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vlan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x8c, r3, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x54, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x20}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x998b}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8d}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0xff}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r4}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:03:05 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000300) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:03:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x2e020000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:03:05 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x7000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:03:05 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) r2 = socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="01400000", @ANYRES16=r4, @ANYBLOB="53e60000000000000000370000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000800030000000000faff040000000000"], 0x44}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r2, &(0x7f0000000740)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000700)={&(0x7f00000003c0)=ANY=[@ANYBLOB="c40000001a4e36b124e338897ece", @ANYRES16=r4, @ANYBLOB="000229bd7000ffdbdf2506000000080001007063690011000200303030303a30303a31302e300000000008000300020000000600040000000000080001007063690011000200303030303a30303a31302e300000000008000300000000000600040000000000080001007063690011000200303030303a30303a31302e300000000008000300020000000600040000000000080001007063690011000200303030303a30303a31302e300000000008000300000000000600040002000000"], 0xc4}, 0x1, 0x0, 0x0, 0x4815}, 0xc001) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) [ 1078.211365][ T5896] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:03:05 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x100000001) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r5, r4, 0x0, 0x100000001) setsockopt$bt_BT_CHANNEL_POLICY(r4, 0x112, 0xa, &(0x7f0000000100)=0xf20d, 0x4) r6 = accept4$inet(r2, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x800) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f00000000c0)={0x8, 'batadv_slave_1\x00', {'ip6tnl0\x00'}, 0x6}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r7, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r7, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r7, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000180)=0x10) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:03:05 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1, 0x0, {0x0, 0x1, 0x3}}, 0x18) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x100000001) recvfrom$rose(r2, &(0x7f00000000c0)=""/147, 0x93, 0x2, &(0x7f0000000000)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x0, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x40) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) [ 1078.664998][ T5893] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1078.712199][ T27] kauditd_printk_skb: 12 callbacks suppressed [ 1078.712211][ T27] audit: type=1800 audit(1585908185.900:1451): pid=5885 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="cgroup.controllers" dev="sda1" ino=16591 res=0 [ 1078.756990][ T27] audit: type=1804 audit(1585908185.940:1452): pid=5878 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/731/cgroup.controllers" dev="sda1" ino=16591 res=1 [ 1078.785513][ T27] audit: type=1804 audit(1585908185.950:1453): pid=5881 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/731/cgroup.controllers" dev="sda1" ino=16591 res=1 [ 1078.863562][ T27] audit: type=1800 audit(1585908186.050:1454): pid=5878 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="cgroup.controllers" dev="sda1" ino=16591 res=0 [ 1078.908900][ T5885] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1078.928846][ T27] audit: type=1800 audit(1585908186.050:1455): pid=5881 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="cgroup.controllers" dev="sda1" ino=16591 res=0 10:03:06 executing program 4: accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:03:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x32010000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:03:06 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x8000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1079.127657][ T5921] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1079.162123][ T27] audit: type=1804 audit(1585908186.350:1456): pid=5920 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/732/cgroup.controllers" dev="sda1" ino=16579 res=1 [ 1079.257312][ T5920] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:03:06 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x0, 0x4000}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:03:06 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x10000032e) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:03:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x3c000000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:03:06 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x9000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1079.685649][ T27] audit: type=1804 audit(1585908186.870:1457): pid=5934 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/810/cgroup.controllers" dev="sda1" ino=16584 res=1 [ 1079.686707][ T5939] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:03:06 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000240)={'filter\x00', 0x0, 0x3, 0x28, [], 0x6, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000000)=""/40}, &(0x7f0000000180)=0x78) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1079.823398][ T5934] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:03:07 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0xa000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1079.868048][ C1] vcan0: j1939_tp_rxtimer: 0x00000000dca8681d: rx timeout, send abort [ 1079.876587][ C1] vcan0: j1939_xtp_rx_abort_one: 0x00000000dca8681d: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. 10:03:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x3e000000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1079.917046][ T27] audit: type=1804 audit(1585908187.110:1458): pid=5946 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/733/cgroup.controllers" dev="sda1" ino=16625 res=1 10:03:07 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0), 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) setsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f0000000000)=0x1, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000140)={'veth1_macvtap\x00', {0x2, 0x4e23, @multicast2}}) sendfile(r3, r2, 0x0, 0x100000001) bind$vsock_stream(r2, &(0x7f0000000040)={0x28, 0x0, 0x2710, @local}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r5, r4, 0x0, 0x100000001) r6 = socket(0xa, 0x1, 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f00000000c0)={r8}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f00000000c0)={r8, 0x4}, 0x8) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:03:07 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000000)={0x29f4449d88b670fd, 0x1, [@dev={[], 0x13}]}) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r2}, 0x18) syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r4, r3, 0x0, 0x100000001) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000700)=[{{&(0x7f0000000100)={0x2, 0x4e20, @loopback}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="ed84ad719a074d1cbf28ac9f29bf6d22594aa29effab2e547a00a07ac3", 0x1d}, {&(0x7f0000000180)="6b0ee0", 0x3}, {&(0x7f0000000280)="dd22efd4b3d40c9d9686d9d45be00a6d2bb72fbc9b3b6bf975ae431049d16c64b2ce14a0b75cfa71b964ac94be2d42d0cec8b2b24b3ffee091972a554ae5fd96f253791ce6fc7e21ad39523d8fbda0f7797c2fdf5814f2c46be2a29cedb88ab559fcb58c0b418f0d073fe1f18d31cbcec524a9e0c32c891e9c0800b7a0949b2c180c4ec7c49a1c3f5b1c03536ae67d7db762bca9463fc3e907c8cb1f361740c2ffa746715f1ddb19f291fe55693098de77017cc14469f1a6a46b6e71d53109fb73ad70adb0f102f92e2daedb4991c0e32a4b3f111ff6884589e01de2782e277ad479b423ee59b31343e474593c6fae3fa29d729c05", 0xf5}, {&(0x7f0000000380)="576ea717e5b37b857bc40d1fdfbf9deeee13ba99bfab7bab92ebe6417838ed218cbaef29d745c6d8160bfe6ee8d7265c2365fe6581fbaff7a3959062c27a0ba5b9b3cc8ac5f6c8e654b168a96ef4856513198d13453a843b935e0ea9528286be94ec9bd862639b278f20d2227fda916ef714447c7855ddda6d192103fc4485269f7fbadaabb2ba01c985d26727aedd09ee8d98a2f0042ae8382c42fb8f4bc85508533d099592c1f3917ec2d0bdf3c596bb6b65a4bbd9c375df9e876c8f7a1e5400ad319179ab6a7f0ad15ae582ccff14279ebdada21fdaa76a543431bc7f6986959e47169e00283a2121acef60", 0xed}, {&(0x7f0000000480)="cb2fffd3676a414e478718b86ef6e2205abddf1868d95b51bcd9ea3d9213a5abbe42943d4a5a689d03b5bfab86505de3212c62367b9c29abe6f8a79e76dc18571b973fd7302b23d770533231f4103a717a11e9abd71b03fd1362be3d02eb3978c713fe6f29c5a1f63acfb1092332a63f687f276d53302f625e8233c17d5f201d456ec0f6b86dd0c7dfbfdd6e5eebd3071d3a258e4de4b990a982bad860f6b53e8a4b137808ed8289c97c381da6258f6fa018e3e388ee9a1d3bb14928f70e6c758f5b90cdc6358a3a70c15e1be4b0b830785e07535d458f1c", 0xd8}, {&(0x7f0000000580)="93ad1f882593e29ebec2447a30a4b3b21e120cea9b1c27565d423d4cf2b3b91bf9ccd9bfc5a399f1b1fc", 0x2a}], 0x6, &(0x7f0000000640)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffffffff}}, @ip_retopts={{0x58, 0x0, 0x7, {[@noop, @timestamp_prespec={0x44, 0x44, 0xf8, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x9}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3}, {@multicast1, 0xfffffffd}, {@remote, 0xe78}, {@multicast1, 0x6}, {@broadcast, 0xfff}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@empty, 0x8}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @empty, @loopback}}}], 0xb0}}], 0x1, 0x41) sendfile(r6, r5, 0x0, 0x100000001) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r6, &(0x7f00000000c0)={0xc0000000}) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)}}, 0x0) [ 1080.104207][ T5959] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1080.297728][ T27] audit: type=1804 audit(1585908187.490:1459): pid=5962 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir838524438/syzkaller.gUHpbg/971/cgroup.controllers" dev="sda1" ino=16641 res=1 [ 1080.354421][ T27] audit: type=1804 audit(1585908187.540:1460): pid=5963 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir838524438/syzkaller.gUHpbg/971/cgroup.controllers" dev="sda1" ino=16641 res=1 10:03:07 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x3c, r3, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vlan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000380)={0xc0, r3, 0x300, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfcc3}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1d}}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vxcan1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0xfff8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x38}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7fff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}]}, 0xc0}}, 0x1) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4400000010000104000000000000000000000000f24c9ddcba139cc5b4b2b6bec2a856db2a358d41ce1d7e7eb00f9ed1562aa8474d351d0335ec1390d7258b06b6384c68a595d92eb078dc179e9b66d6e4d34a273997adb8e39c21db20cca1652bacc8215df34fd908badc9c2a", @ANYRES32=r4, @ANYBLOB="0100000000000000240012800b00010062726964676500001400028005001900000000000800050000000100"], 0x44}}, 0x0) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r4}, 0x18) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r6, r5, 0x0, 0x100000001) r7 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$FICLONERANGE(r5, 0x4020940d, &(0x7f0000000480)={{r7}, 0x2, 0x4, 0x6}) sendmsg$can_j1939(r0, &(0x7f0000000040)={&(0x7f0000000b40), 0x18, &(0x7f0000000080)={&(0x7f0000000000)="2a25b0fe94d9d103a037f1ffff07d4bf32fc761f5478997abf5f40821ceb00"/40, 0x28}}, 0x0) [ 1080.556841][ T5946] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1080.596227][ T5938] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:03:07 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0xb000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:03:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x3e020000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1080.801304][ T5981] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:03:08 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[]}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:03:08 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000500) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:03:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x3f000000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:03:08 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x0, 0x4800}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) [ 1080.868534][ T5978] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1081.048736][ T5980] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1081.059318][ T5993] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:03:08 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0xf000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1081.101259][ T5991] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:03:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x40000000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1081.279893][ T6005] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:03:08 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) ioctl$PPPIOCGMRU(0xffffffffffffffff, 0x80047453, &(0x7f0000000000)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) socket$netlink(0x10, 0x3, 0x0) 10:03:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000000)="f1cb559c6136c70b3830b4ca2d9b9d0982fa3cec4d9e29d1298f49d8cb99ecc2517cb97c13119a11078105e2394ca56e73272f1780ac123671436f0ddc9c1d3d41d698cc20", 0x45) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x24, r4, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000580)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x30, r4, 0x200, 0x70bd2c, 0x25dfdbfc, {{}, {}, {0x14, 0x19, {0x401, 0x0, 0x8, 0x9}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x410}, 0x4044808) sendfile(r2, r1, 0x0, 0x100000001) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000140)={&(0x7f0000000080)="fd42987dc8baa1f37024fef00edda9055a6aa7d5eda714f9d378edee9fb62866fc9c0002c15773eeb1df2e9926916732cb890cbc51f4135235246f9e817e13dd129044b1e3e051a9b587f14d8bd319d5d6ffd52d6dca942cc9ada4fbce4c35813b30ce66f9840f747e6e20273f3fba346e1605364e9e52fe27c0ccafd47ff8c2d3c8f0afcf0c99fe5926c79df10b2299a65d1bf6c7ca9be44a39cfc955c0b024ba2c5d8ceb0c8a244a2a8b1d0e158f4c0282449b14c826", &(0x7f0000000280)=""/165, &(0x7f0000000340)="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", &(0x7f0000000440)="289f3ca406883e8aa94ccca42d521edfd8a5e5a95acd4dc59ab1f6eaf81db16ef114b1e5c23b3869af4d29459b2223e4c7d05557838f6381c241cf357a88ea16076b2584c1c76600e095a49de0992a77d882715f95646ae02168739371767fe9c9dbebcd3d170016b96116574c2e1eb471d9333eccfe066af08077ee109b6694c13064460d42315af6428a6d2aa555a1b86e1250e62ccc13863c", 0x0, r1, 0x4}, 0x38) r5 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r6 = socket$netlink(0x10, 0x3, 0x0) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r7 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000640)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LIST(r6, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="100026bd70000000000003000000080001000300000008000200020000000800020002000000080002000200000008000200020000000800020002000000edc3b16645ecfc0e6f2a835153df6bfb5434f518ec798a1521e2eaeb90dda773ef51db2abd54e59a3e33ff40cd01b9f43047b1af6b8e2ecc82551ade6f8864365517bd1e18b9071df0c1ef15ab020bce1cf00331225984150447cbf2caacb6542d9e22aca685f65f"], 0x44}, 0x1, 0x0, 0x0, 0x4000085}, 0x0) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="04002cbd7000fcdbdf250300000008000000030000000800020002000000"], 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r5, &(0x7f0000000240)={0x1d, r8}, 0x18) 10:03:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x48000000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:03:09 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x10000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:03:09 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000600) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:03:09 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x100000001) write$binfmt_misc(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="73797a31531dd2c6f4bfaa698e9818619e8fdb58030d4f1b306516a8d1f77dddfc1fde1d614b947693c486ca17f75e0d0f24dce3ab08a5d17ec17ea3a01bc0e34f7721ce2c29091e60d545733ecd63d2035e69615cb0965fdec12b6096fe7186678e8cd210898287e30be2053b3d2bd514be0c84c5b4fbefee7f95146a96990c5353f8eab3ce6dbb6f5b6991d8a4d052fd"], 0x91) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) [ 1081.890537][ T6011] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1081.999607][ T6026] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:03:09 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x18, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0100000000000000240012800b0001006272696467650000140002800500190000000000080005000000010073708dc541ca36faa3c9e4a7edb060fbd708e2d75aed71df711ff837e8d8d49864591f9e41d1f18aa156a770b3956aedff485a1d89bdc8ee7dad8e8de7806661631e5b3062529a1cdd90f6bf52b749cb3e56b0a9d9573aa6f53e53019750b8f6d4998cac0f3b521b82268c7bdae410f9a53a8957443a8ce01cb4f43e0a45ccf68328be09"], 0x44}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r4}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) [ 1082.137520][ T6028] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:03:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x4a000000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:03:09 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x0, 0x4c00}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) 10:03:09 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x11000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) [ 1082.233562][ T6020] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:03:09 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="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", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'gre0\x00'}) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r5, r4, 0x0, 0x100000001) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000000)=0x2, 0x4) [ 1082.343159][ T6040] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1082.370370][ T6038] dccp_invalid_packet: P.Data Offset(103) too large 10:03:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x4c000000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:03:09 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x12000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:03:09 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000700) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1082.665639][ T6050] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 10:03:10 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e29d) mmap(&(0x7f0000829000/0x3000)=nil, 0x3000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000001) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x28, 0xa, 0x2) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRESDEC=r6, @ANYRESDEC], 0x3}}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000300)={r5, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) r7 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r7, r1, 0x0, 0x100000001) r8 = accept(r0, &(0x7f0000000100)=@vsock, &(0x7f0000000000)=0x80) sendmsg$AUDIT_SET_FEATURE(r8, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x20, 0x3fa, 0x400, 0x70bd26, 0x25dfdbfd, {0x1, 0x1, 0x1, 0x1}, ["", "", "", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4084}, 0x10) socket$netlink(0x10, 0x3, 0x0) 10:03:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x50020000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) [ 1083.168614][ T6056] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:03:10 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x13000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:03:10 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000280)={@void, @val={0x0, 0x0, 0x0, 0x6000}, @ipv6=@dccp_packet={0x0, 0x6, "3e3086", 0x18, 0x21, 0x0, @dev, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x4e22, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '}8@', 0x0, "c1d012"}}}}}, 0x4a) [ 1083.300006][ T6067] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1083.523350][ T6074] dccp_invalid_packet: P.Data Offset(103) too large [ 1083.547031][ T6057] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1083.561845][ C1] vxcan1: j1939_tp_rxtimer: 0x00000000044148e4: rx timeout, send abort [ 1084.061768][ T6074] dccp_invalid_packet: P.Data Offset(103) too large [ 1084.069106][ C1] vxcan1: j1939_tp_rxtimer: 0x00000000044148e4: abort rx timeout. Force session deactivation [ 1084.081112][ C1] ================================================================== [ 1084.089484][ C1] BUG: KASAN: use-after-free in __hrtimer_run_queues+0xe18/0xf10 [ 1084.097221][ C1] Read of size 1 at addr ffff88809df30d73 by task syz-executor.3/6074 [ 1084.105363][ C1] [ 1084.107698][ C1] CPU: 1 PID: 6074 Comm: syz-executor.3 Not tainted 5.6.0-syzkaller #0 [ 1084.115932][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1084.125992][ C1] Call Trace: [ 1084.129320][ C1] [ 1084.133135][ C1] dump_stack+0x188/0x20d [ 1084.137472][ C1] ? __hrtimer_run_queues+0xe18/0xf10 [ 1084.142860][ C1] ? __hrtimer_run_queues+0xe18/0xf10 [ 1084.148243][ C1] print_address_description.constprop.0.cold+0xd3/0x315 [ 1084.155283][ C1] ? __hrtimer_run_queues+0xe18/0xf10 10:03:11 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x100000001) accept4$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x2710, @my=0x0}, 0x10, 0x80800) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000280)="2a25b0fe94d9665114", 0x9}}, 0x0) 10:03:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f0, 0x0, 0x250, 0x250, 0x58010000, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x3, 0x0, {[{{@ipv6={@dev, @loopback, [], [], 'team_slave_1\x00', 'nr0\x00', {}, {}, 0x87}, 0x0, 0x220, 0x250, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"c7fd"}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 10:03:11 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000900) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:03:11 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x401, 0x14000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3325}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3ff}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x6c}}, 0x0) 10:03:11 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001c000100000000000000000007", @ANYRES64], 0x2}, 0x1, 0x0, 0x0, 0x24000080}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) socketpair(0xb, 0x3, 0xffffffff, &(0x7f00000007c0)={0xffffffffffffffff}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x44, r3, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x10, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x44}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r6, @ANYBLOB="0100000000000000240012800b00010062726964676500001400028005001900000000000800050000000100"], 0x44}}, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000000a00)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000840)={0x168, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x88, 0x2, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}]}]}, @ETHTOOL_A_STRSET_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x88, 0x2, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}]}]}]}, 0x168}, 0x1, 0x0, 0x0, 0x800}, 0x8040) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r8, r7, 0x0, 0x100000001) r9 = socket$netlink(0x10, 0x3, 0x0) ioctl(r9, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 1084.160752][ C1] ? __hrtimer_run_queues+0xe18/0xf10 [ 1084.166228][ C1] __kasan_report.cold+0x1a/0x32 [ 1084.171173][ C1] ? __hrtimer_run_queues+0xe18/0xf10 [ 1084.176545][ C1] kasan_report+0xe/0x20 [ 1084.180789][ C1] __hrtimer_run_queues+0xe18/0xf10 [ 1084.185999][ C1] ? j1939_xtp_abort_to_errno.isra.0.cold+0x42/0x42 [ 1084.192597][ C1] ? hrtimer_init+0x320/0x320 [ 1084.197280][ C1] ? ktime_get_update_offsets_now+0x2d6/0x450 [ 1084.204256][ C1] hrtimer_run_softirq+0x16d/0x250 [ 1084.209379][ C1] __do_softirq+0x26c/0x9f7 [ 1084.213901][ C1] do_softirq_own_stack+0x2a/0x40 [ 1084.219445][ C1] [ 1084.222388][ C1] ? tun_rx_batched.isra.0+0x46f/0x7d0 [ 1084.227851][ C1] do_softirq.part.0+0x10f/0x160 [ 1084.233059][ C1] __local_bh_enable_ip+0x20e/0x270 [ 1084.238381][ C1] tun_rx_batched.isra.0+0x491/0x7d0 [ 1084.243868][ C1] ? tun_get_user+0x11af/0x3be0 [ 1084.248725][ C1] ? tun_cleanup+0x30/0x30 [ 1084.253587][ C1] ? lock_release+0x800/0x800 [ 1084.258852][ C1] ? lock_downgrade+0x840/0x840 [ 1084.264245][ C1] ? __local_bh_enable_ip+0x159/0x270 [ 1084.269719][ C1] tun_get_user+0x134a/0x3be0 [ 1084.274564][ C1] ? tun_build_skb.isra.0+0x13c0/0x13c0 [ 1084.280604][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 1084.286869][ C1] tun_chr_write_iter+0xba/0x151 [ 1084.292332][ C1] new_sync_write+0x4a2/0x700 [ 1084.297013][ C1] ? new_sync_read+0x7a0/0x7a0 [ 1084.301792][ C1] ? apparmor_path_rmdir+0x30/0x30 [ 1084.306925][ C1] ? security_file_permission+0x8a/0x380 [ 1084.312564][ C1] __vfs_write+0xc9/0x100 [ 1084.316900][ C1] vfs_write+0x268/0x5d0 [ 1084.321145][ C1] ksys_write+0x12d/0x250 [ 1084.325496][ C1] ? __ia32_sys_read+0xb0/0xb0 [ 1084.330259][ C1] ? __ia32_sys_clock_settime+0x260/0x260 [ 1084.335983][ C1] ? trace_hardirqs_off_caller+0x55/0x230 [ 1084.341715][ C1] do_syscall_64+0xf6/0x7d0 [ 1084.346225][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1084.352116][ C1] RIP: 0033:0x45c849 [ 1084.356012][ C1] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1084.375615][ C1] RSP: 002b:00007f69709e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1084.384028][ C1] RAX: ffffffffffffffda RBX: 00007f69709e26d4 RCX: 000000000045c849 [ 1084.392012][ C1] RDX: 000000000000004a RSI: 0000000020000280 RDI: 0000000000000003 [ 1084.399987][ C1] RBP: 000000000076c040 R08: 0000000000000000 R09: 0000000000000000 [ 1084.407961][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1084.415936][ C1] R13: 0000000000000d0d R14: 00000000004cf379 R15: 000000000076c04c [ 1084.423925][ C1] [ 1084.426257][ C1] Allocated by task 6032: [ 1084.430593][ C1] save_stack+0x1b/0x80 [ 1084.434749][ C1] __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 1084.440382][ C1] kmem_cache_alloc_trace+0x153/0x7d0 [ 1084.445754][ C1] j1939_session_new+0x7c/0x3f0 [ 1084.450620][ C1] j1939_tp_send+0x22f/0x800 [ 1084.455208][ C1] j1939_sk_sendmsg+0xabf/0x1360 [ 1084.460150][ C1] sock_sendmsg+0xcf/0x120 [ 1084.464575][ C1] ____sys_sendmsg+0x6bf/0x7e0 [ 1084.469343][ C1] ___sys_sendmsg+0x100/0x170 [ 1084.474024][ C1] __sys_sendmsg+0xec/0x1b0 [ 1084.478529][ C1] do_syscall_64+0xf6/0x7d0 [ 1084.483030][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1084.488911][ C1] [ 1084.491236][ C1] Freed by task 6074: [ 1084.495223][ C1] save_stack+0x1b/0x80 [ 1084.499379][ C1] __kasan_slab_free+0xf7/0x140 [ 1084.504232][ C1] kfree+0x109/0x2b0 [ 1084.508128][ C1] j1939_session_put+0x25c/0x330 [ 1084.513063][ C1] j1939_tp_rxtimer+0x2e9/0x2f4 [ 1084.517917][ C1] __hrtimer_run_queues+0x3a2/0xf10 [ 1084.523117][ C1] hrtimer_run_softirq+0x16d/0x250 [ 1084.528232][ C1] __do_softirq+0x26c/0x9f7 [ 1084.532726][ C1] [ 1084.535059][ C1] The buggy address belongs to the object at ffff88809df30c00 [ 1084.535059][ C1] which belongs to the cache kmalloc-512 of size 512 [ 1084.549201][ C1] The buggy address is located 371 bytes inside of [ 1084.549201][ C1] 512-byte region [ffff88809df30c00, ffff88809df30e00) [ 1084.562470][ C1] The buggy address belongs to the page: [ 1084.568107][ C1] page:ffffea000277cc00 refcount:1 mapcount:0 mapping:ffff8880aa000a80 index:0xffff88809df30400 [ 1084.578518][ C1] flags: 0xfffe0000000200(slab) [ 1084.583378][ C1] raw: 00fffe0000000200 ffffea000265d3c8 ffffea00025dab88 ffff8880aa000a80 [ 1084.591974][ C1] raw: ffff88809df30400 ffff88809df30000 0000000100000003 0000000000000000 [ 1084.600553][ C1] page dumped because: kasan: bad access detected [ 1084.606960][ C1] [ 1084.609288][ C1] Memory state around the buggy address: [ 1084.614922][ C1] ffff88809df30c00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1084.622991][ C1] ffff88809df30c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1084.631059][ C1] >ffff88809df30d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1084.639123][ C1] ^ [ 1084.646840][ C1] ffff88809df30d80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1084.654904][ C1] ffff88809df30e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1084.662986][ C1] ================================================================== [ 1084.671043][ C1] Disabling lock debugging due to kernel taint [ 1084.677271][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 1084.683860][ C1] CPU: 1 PID: 6074 Comm: syz-executor.3 Tainted: G B 5.6.0-syzkaller #0 [ 1084.693479][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1084.703564][ C1] Call Trace: [ 1084.706844][ C1] [ 1084.709700][ C1] dump_stack+0x188/0x20d [ 1084.714036][ C1] panic+0x2e3/0x75c [ 1084.717945][ C1] ? add_taint.cold+0x16/0x16 [ 1084.722621][ C1] ? __hrtimer_run_queues+0xe18/0xf10 [ 1084.727994][ C1] ? trace_hardirqs_on+0x55/0x220 [ 1084.728031][ T27] kauditd_printk_skb: 19 callbacks suppressed [ 1084.728043][ T27] audit: type=1804 audit(1585908191.811:1480): pid=6102 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir917208468/syzkaller.NBPTyp/814/cgroup.controllers" dev="sda1" ino=16615 res=1 [ 1084.733021][ C1] ? __hrtimer_run_queues+0xe18/0xf10 [ 1084.768630][ C1] end_report+0x43/0x49 [ 1084.772787][ C1] ? __hrtimer_run_queues+0xe18/0xf10 [ 1084.778154][ C1] __kasan_report.cold+0xd/0x32 [ 1084.783006][ C1] ? __hrtimer_run_queues+0xe18/0xf10 [ 1084.788380][ C1] kasan_report+0xe/0x20 [ 1084.792632][ C1] __hrtimer_run_queues+0xe18/0xf10 [ 1084.797836][ C1] ? j1939_xtp_abort_to_errno.isra.0.cold+0x42/0x42 [ 1084.804428][ C1] ? hrtimer_init+0x320/0x320 [ 1084.809108][ C1] ? ktime_get_update_offsets_now+0x2d6/0x450 [ 1084.810960][ T27] audit: type=1804 audit(1585908192.001:1481): pid=6101 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir356379794/syzkaller.E0EiEY/738/cgroup.controllers" dev="sda1" ino=16607 res=1 [ 1084.815170][ C1] hrtimer_run_softirq+0x16d/0x250 [ 1084.815185][ C1] __do_softirq+0x26c/0x9f7 [ 1084.815202][ C1] do_softirq_own_stack+0x2a/0x40 [ 1084.854094][ C1] [ 1084.857030][ C1] ? tun_rx_batched.isra.0+0x46f/0x7d0 [ 1084.862503][ C1] do_softirq.part.0+0x10f/0x160 [ 1084.867441][ C1] __local_bh_enable_ip+0x20e/0x270 [ 1084.872639][ C1] tun_rx_batched.isra.0+0x491/0x7d0 [ 1084.878008][ C1] ? tun_get_user+0x11af/0x3be0 [ 1084.882856][ C1] ? tun_cleanup+0x30/0x30 [ 1084.887276][ C1] ? lock_release+0x800/0x800 [ 1084.891984][ C1] ? lock_downgrade+0x840/0x840 [ 1084.896836][ C1] ? __local_bh_enable_ip+0x159/0x270 [ 1084.902206][ C1] tun_get_user+0x134a/0x3be0 [ 1084.906993][ C1] ? tun_build_skb.isra.0+0x13c0/0x13c0 [ 1084.912548][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 1084.919744][ C1] tun_chr_write_iter+0xba/0x151 [ 1084.924675][ C1] new_sync_write+0x4a2/0x700 [ 1084.929340][ C1] ? new_sync_read+0x7a0/0x7a0 [ 1084.934348][ C1] ? apparmor_path_rmdir+0x30/0x30 [ 1084.939563][ C1] ? security_file_permission+0x8a/0x380 [ 1084.945184][ C1] __vfs_write+0xc9/0x100 [ 1084.949504][ C1] vfs_write+0x268/0x5d0 [ 1084.953743][ C1] ksys_write+0x12d/0x250 [ 1084.958070][ C1] ? __ia32_sys_read+0xb0/0xb0 [ 1084.962829][ C1] ? __ia32_sys_clock_settime+0x260/0x260 [ 1084.968541][ C1] ? trace_hardirqs_off_caller+0x55/0x230 [ 1084.974332][ C1] do_syscall_64+0xf6/0x7d0 [ 1084.978839][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1084.984712][ C1] RIP: 0033:0x45c849 [ 1084.988596][ C1] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1085.008207][ C1] RSP: 002b:00007f69709e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1085.016612][ C1] RAX: ffffffffffffffda RBX: 00007f69709e26d4 RCX: 000000000045c849 [ 1085.024594][ C1] RDX: 000000000000004a RSI: 0000000020000280 RDI: 0000000000000003 [ 1085.032568][ C1] RBP: 000000000076c040 R08: 0000000000000000 R09: 0000000000000000 [ 1085.040526][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1085.048485][ C1] R13: 0000000000000d0d R14: 00000000004cf379 R15: 000000000076c04c [ 1085.057995][ C1] Kernel Offset: disabled [ 1085.062322][ C1] Rebooting in 86400 seconds..