b85a2d5c22e963ea7a8150f6a2593cba0372c47ece901464d15764a6d6d636e2265ffcccb2062fc80b30fbdec109d27ca4fa1c76ff0dfa8361a4e11485942d9f2d674597b187b184add5d2a0548b9c4129ecda46c2a67db084f546d75c51556411712d4e732ab7ba5efe987f50c4b6077ddc55fac355a956110f811a5ae8e4a4ae2ea7e2fa0d1550f66cfc6859f1b19a8064080d893478b5d"}, {0x100, 0x11, 0x1, "8efb4f0238e63912cb711b3fa1af73b8060a6f01e834a000fe8d43335217df32a02b8929f297501df55d8bd01ec366b2865d6046e3b72ba648b062a94036d3235a52e451837d0252ea220b4d14bb0e1fd5f181205605b72680f9a8248606130c9afcef5f254188f9941a0c51f403c4b547731556f50ab42be333c3ed341cc87228c1d4db53d8b19f9a33003f4a0bc99fb4c6dae3e4aa15b38e362321f31691dde4366187ed3f776be8d12af8ddf9050961d99bc03941d48cfd10388188f700e7667a9f2f945f7080bcefa23788910e92745d05f4d33954173b0c2cc7d041cbe08cb9cfbaeac05a80f3d1"}, {0x1010, 0x1, 0x4, "d6cbbf945b0145bbbb085fbf40c3da2623ab451bcc73079cd7324148eeee881447d0a33ece64019a5588ec925288f77ba996b066f8b9f6ecec3e072201d50d48280d7206b918a9bea0e0432268ab68e87b074bc75b70dd440dfe94b6b49ce63b18372a8219870db29002c48b40ca871a3e74f3b52f30ac465e8460ec2304bf1e4f2780c147f12a652ce773c926c784db6cff91df73f4b9dcd11e9d4143d65dbeeb0ba8e7a07fce47db3599857a294bd3d0e76cc3f6215f6e346d9ec79342af9fd3ee48382cd091cbf4629cdacb9070da67e257e3f622a30422bf2348d44f7ce57caad6bbee2a52115aee90da5e94c00174864912044baa54921fe3924f7d9978f1050e6bc84c1443ced61966d10dee2fc7b428ea9aa3bb09cd5ad6032c6b2bb52f7200b29091885edeef451530209a04b936ba2b33dbb06212334e4c3e88e28ddcba8fc10ca7474036cf288552a2a763578edd398b5934c266a620c3fafbf2f445bc9590c2cacc5f4d2ce923b1039e1e21524af6f335c6af6103bacb95b0cc704fdf74f2437264ff5e3db70018ac2db2b59f45761fd3c14829929af927860d679298a5d990d59dfa12a442f8932727e13ced5e930aaccce202ea546f77fc4aa1d8870eecbc9e46e675477a38c382a2d5e05be8dd53392285ceb818e34ee1e665e51c0d3b16ba10d820ea324c0aa92bcfbe2e4a70eeee6a9d1d238d45a13878a5ac8a3ad848286d9d6b23fcc7c8b00586b76970f73df344f13cd4e07b3f6dcd28719b4026fad3254400ce413c7dcb9abf149ff3bda233c811efec82b97335146d3e0e4ef53760a280a3dd13db060e43cd4e363a8293768347e542251df8691f7d2e1723383bd015f0cbc6666187d521169f8bd76103ca66a4928e74d7123a17e6eec491185af5cf1b374e960d548d2b7607ff466dab395e503e6560b8d625f556bf28a6ff8fc89161286cb502a58f6e896ede5f01496d19abf8a75af6947a6240196770771a175e5de5c776943aff178815cc3d3d1d69e5a56ad5349d3d82a1f2fc611d30ce7d9f4e6d41823fabd2bd536576fc8030d096e2f7be2b7522686716db6716eaefbd3546d2b6a9086eec0c488c184d30faa896a10b09ea9009774fd87500a19cc8cebe3853d9aeac0baf47350ac87e37499ed747042417168bf9b1176aea5be1e7f444220080c6e04d343689f487205341e2b4359f876f62589f8634d25da203cea7b9521effa9f62be699e6325701bddcf6dae34aa1c993ccb28a51899f3e68f28c284493d7a4a5f7ac3ed11ca8efc4f40b58e14e869ad595361b083096c15215f37a942066ebb35a7e884ce49d623258c38bf8084930b0fe9884b446036f21cb16cc67d8e1cb0cf933988492645d64ade0c7c0619f920c44076f67678abf80af816843e221d64d4a6b34579141d83d0390c6c8e0083ba9c6b93a50eb0b508c56cecaa98739b7bf9c4a49a40439fa2097bc9f383026262005b88de5d09a050acf408e0be98542ad13ac4c30345dddf5d6ea548cf16cbdfd8df2152d51170395f25976f731367021bfb7c97045b45a49cf519161468ec56719c6d9e3142f5f697bae801f589c4e37135d263d9d4355e0f61398f626fe7ae863f90e0b81727dfc90013adab18cdd475e67729ff07c5de09bbb9d1731169017da0c1a7cdf6a9e2725978bfbbe6261a1e3d804693f6a1954c9983a60d74584e31d7afbb76307d59d036eb356be6fabb78520ae233f1d6572ec31ba5ff54db8dd4610198748237db8597cfcff0ef7ade699707d7767adf86bba0ed2a6a843daac723fc1f4803840670594f1ef34960ae1393542a82e4b0c9af97079c251e2304b39ff8a630b74b11438f61985ffa6bb601f1d41a3b20dd72273b4e5f9e11d227f30b49e4992528dab737538c1ce73ac68d04a467aa44d983365893c6eb65dab938927cea4d75c9f4a0605976418ef973454260e65fc615f591112508b29432d58af63359b3d3fe01dafb54ceccfd5ab8698ab2e19d3ffa9c79a67483fffc9a26941107edd8a4c5d44d4dfde9d97f8f7de4b11950f03ffbedf09dacc2b832dc4b9406a0dd7c7e16ee7fc82eb5960813cafcab6602d0f65c5b293dd51fef78802786a0f7137c37d8657fe14764d369af2b08a84e1353037e871c3b15e4b85a9cd431db478ad0e29000d5e34a3f20d94f7352afb8ca691e26a992b918cfa3865460979bde988ac9d6dd7b0c6d751a31cee297fd2831dc768d85ef5ffb67a2492b200678f84a82e718d86a3dcf8c81bb76b6cea650c308b6b8f913c393d18c90a1d72220a9a3285f4d9ee013032c3a76d1c48ddd3cbd2ddd17c3707a63dc88a3e109cede20bdeff016c2f9aa01e39116cf14004fb946af91b34b60703423d598dd23878aed88030d7949c21115f7a756fea62200a80c492e5952c966641242b5d5f10a425f4a93e6368398e89fa25c7d165d81766a7aa1a1cc164fb94791158da699fa8d9c1e1a08c6156b3ceb8038ad5cf61dfdcaf62b3205e21139b2ba764c7b2ccbca401c1a0ce5e0d084fad1cade64ab01c221eb718277ec9a699957b38927714af26b3efae677f6d07dee84a6ae31dcb2928e029a6111059096a25cd9e5cfa343a9859cb40442032daf1fec572d2794c70e506eb5626dd48957583a10cf664ddacab5a8c68ccd395252e2872aed4ec56a764b3c97d918fd35e7bf284a5d7b956476736d6478fe6b42d212b3d6f469e2fb92e85bdebd624dfe47f99ff5734eb22f5a34427bc87c7a82b3fc510b105f5a283be287ccec80afa255d7f16d720037389eeaf5720312f9c322dca5914c291b436b38af10b9ebd7a4bde142368f52a143c4d02e5e9fa39701a478149e60360024bd7f295e14a54fbbefb0db7cc2d3e11715db939ae11653301f139c39f5ba6fedd52b304c05eae68e7d57a314a72a08b1a29f9e599860e7a4b91f3f5fc744141cb0f54c2547319134b59dcdfd26c5b87db9a60a4a72c690e6e7fb85c67900c84b91cce8a0329b5e3e4383c836e3f159701e992141456343c7c38689035032b8fd93851ec6ed266fe26b12861d7f5dd651391ed5f66eb69409a35cc96a193013828cb84fd3f20eddcb4e49b50d0224606bf3dd7b42f795dc7bbdd48b5b7c2a1d68701d3d0924c1803e169588f1bce7717ad1df0ae71a8b70c2b57202784f368e04654c18c299d69374370f65597255f7f9642918af277ce571b6a18268f5a352f10d1b7fb011eb041745c84dad6b83bd9b12357226c76e6750d1d768227b68f5f1bf1224b1e443efb9942166421ff6b4a23d2fcf26829983cf1e2fa4202b04ab8f2c2d313025beb0a0fc5a34bcf6614ea1a8df1f54fb6c9cde2035c67b5a2cd3b638afc14c5054e7caa9a271c241a5dc829badd6e586237be329255ea6ab9f031b920a1ab3c921fdbd512b3a022ac17dbb68d28ff53ee406edd0efc9245f4c0068ef4bb9471774572abc0036bf39cc83bd08297c5415f52c8ceb3a90e234a6eb7ebc6292dda0dc1f33d3f7e54ab1ba04d82e28d3b9c66e13d310adc076307241e7c60e76e40017b15871edcc5fe3d4ab0487c2b081b105196586fae659c365518ad1cff7d611757b2d7b5696f5a7b7c2ad255f87482c8c6dc81396d35dfcb5bbf97daa025eb77700bd28d344da32b2a184eca49427d4ee17029649b2b27b3b3a2feadc3089026a4e41a060562372dc48705f4a8bd0d3ccc0551900e894e30685fc10d22d23fa3b287c9efbb2894f4b43e981dc4ab252a384f6ee45dc778ca183b1bddbf9ecd06ca1f93adc3a05c0b440b5ab2063a324b0d6b6dc807af1464eee2eb0b4f7d736d028bc7baeecfffa17c9ba1ee9862c1da86b3f2631c6afcff2082589f0c9aeff74337000b36174e38e170a17edb3e830f493e2ba5d0b357d7ab7a85d4cefc0e036408ef5a6cb3fc416d38b06ac04e59a941154b54b47d58ff76737bcd7a6a2909ec067af4c07e87e33c145685d02ff7bfde138f1f6a2032fb51032ca5258bc09acba846dac8880456e308dc888812cda2839b63f2b4b8410c0b706d0f5773dfe68524e01fba325086324ae48f37b6805e7dbf4e322c95bc6d5cd458bdefa9dcbe7d4061d66ae4428a091982192f8e482618bfa53f72e3de2453d030bb68e2ef6325d29285497fc6e3143b0d17cf28c86542bc018df0c650a6c336ce2ec608961d551c301014d715284e096fdd009f333d3ae48f2321a372ccdcdf269e025e680f57304d1980408459c84a3c350d65fd27b576c956f5a1d03e699a90422a17d1a3ea1f50df45f2606fb26107add421ea4f714217ececb1a8bd48fb2c6bfe31c59e1becd64ebfa819213b47f51293bbca7bd1bbb92302e3c8f69a28da80b2aa3cb9b21c520e74153cd248d4e5bae1c2f1a1d8fdb322e22c9028756069c4f6c81449b80bb940b8b3f58bbc54ed99187383317ddd948e845668a59fe066e40d98cdd7115574b8a2861039982e2950317272a39bff7ace0c4ab09d49a1f3233e1b06b932eb4cda8c160e093ca19b7afde631d0d44e372db070327a8612e9d01f604e6c495dc207f027f3152ec82a76ecd4456222a6ac3e9962087e88101692af4043e5c503d34b4cb698260b75fcea492788a15fc615abe1f80b9d94e327fcd4db6cc84648238cf651ac1549c44d977d5c62de0e57e8588e5a574f529e6c572a478eecda38fc05bcec532459e9eac5cdbf0c4b510e50f3b9bba73aa393e602ad82b20db3d2c6f03b501ba9663ca7b5be36b986f7ddc122c2cbece74ccea8b3b6efc556aac8571fd5de6dfe6126ca29125072555f045f6ebd11b36bfe38216804417c7037f8d2550d0b39a5baf56536130457abeba174ded8d481623cc4d44fdcf10c3e4ce1d9435710a193a626297c360cbe895496dd0192cd221a7aaab1f2edddccb6f5b46df16001f765c56aa221869fbecb2b9890ef9cad954fe986861a20c892c3a3847d1722dbed11980a294621f7665ba46b42462e2bdaebf63c3065cd388bad73f14b5e2aa8dc20d8a2fbf6249c40af8448d5145247f8704c17f2139f1379b7fa3f67fc2fa483a659c27b6df65e85c9d16a5c1ea92eb82f047f87ec2336cf647c9f27d1333e157084e0c9f368aaa968847c28bb910c8f8544f77ed1cc8fdaa4a548bc0715223b9f49547b7cd5a13e3698c1b444d17e9cb5fa8d91c85bd7ee8e4235531e16d732eeb3f44ab523cebd4d2bf11cd438d502d4ce947518e150bd0ac83eafe8f415a7ca37227fb511cd93e53bff03bb6fe73917f40fea1f454a5676940ed696b48858de6e6743c966710e4a948a43f248c8a696452b4fafba5377d021a0503275ade62d7e13d6b78c936c2dc21e538a61d27936b28c2e686227b19847f145cf5c3c34178d91b62e4bfe095ffcab1ffbcf5d226333c2721a5672088a0c474fc63b465c2639768edee7e5759c5ea77d015f37220bb670542aad39434acca5b5a8d44155c4a5016ad014abd72e2a914a08ca3fdbaa53abdc9ecfd473f0b0a8091f0d3e22d949918ffb2e2e6ee8fb8da04b626d728d3eb6aba6c4648e196e95c7703024a3f59fe4535f886723409c93280cdabe12d58299f6f737d6dc701ff2e15725547f69107549344e9bd6b5e7896072b4e1fcf498dfd635a5d6243dad921fd99adde59a3dbe39fd70b7a0b57bf47d94a768f4571790d0480ae3e1464266df50fe826e608caa6263b412ff6272957e2907f71023f25262b3a999d1b90f9c61aa9a0366205ddc08647420b1052f25f3d89c7f56aec23e84a40b18b5ff146a9d7ffcc6c2e8cdd5e3f9ba15"}, {0xd0, 0x100, 0x1000, "91afa77aa81921dcbfa0dd4c49ba16e0b676221495e8b60febe3d3af2d4c00d6663809a0594b2075f074b0a75fb44c4ea2003a0f83f83986bc5c6606af6ef03ba52e0ea7e66928638ad0efe613cb50b923a104492d5f83cbb3719fe854a77526d1769657cc9fdfc4655c4bf02e97b54c8d5fa2e13e60ed48ae7364b4d9c4608e4716c4283f7cfda4917694f0804648145cacd7e30dbdfe61d7f0583793df28cf8794d45f46e3ebce12946cd956a74b6145f316c7310d375e3b172600563cf5"}], 0x2510}, 0x40010c0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2d, 'cpu'}, {0x0, 'pids'}, {0x2b, 'io'}, {0x2d, 'pids'}, {0x2b, 'memory'}, {0x2d, 'pids'}, {0x2d, 'cpu'}]}, 0x28) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000d80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x5ee, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 00:49:29 executing program 1: getpid() perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xdcc8, 0x2, 0x0, 0x40000, 0x0, 0x0, 0x4, 0x3ff, 0x8001, 0x4, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x3, 0x7, 0x1}, 0x0, 0x7, r0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000fc0)=[{&(0x7f0000000f00)="38f84d2240e5a5705cf7484c88a188d9491c354fe7a75d65b01e8d7299e7894e6ff05c7ccd0e28b626f2837c709c5d8d7fa67b162a4caf5bf88a8a9ed791facd9cc7f9678681b0a6c0757504e0ba2f7d5a6cccb928d69cfb40460ff577a96b648a59bcf9f8a6f86536bb71cf0755ce901ff683a77219951b5005f5d4d0581a4fa9", 0x81}], 0x1, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], 0x248}, 0x4042) r2 = gettid() perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x4, 0x9, 0x3, 0x0, 0x0, 0x5, 0x0, 0x5, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x4, 0x0, 0x0, 0x100000000, 0x8, 0x2, 0x9, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1}, r2, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x0, 0x4, 0x4, 0x2, 0x0, 0x7fffffff, 0x22102, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80, 0x0, 0x8, 0x0, 0xfffffeff, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4}, r2, 0xa, 0xffffffffffffffff, 0xb) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x4ea00) r4 = socket$kcm(0x2, 0x3, 0x3) sendmsg$sock(r4, &(0x7f0000000340)={&(0x7f00000000c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000180)=[@mark={{0x14}}], 0x18}, 0x0) sendmsg$kcm(r4, &(0x7f0000001440)={&(0x7f00000012c0)=@rxrpc=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x4e22, @local}}, 0x80, &(0x7f0000001400)=[{&(0x7f0000001340)="5b3c44471b1014da1ce696bb1652d37df05f66181c6bed077439f3c207dc958994f0fb96dd2273e6a3765efb06ebdda3e93f7b77808bbd64610231d558ccc448e6d9d684d58fe5c4ce3d196bca602997de589fbeb9ec6a94d683d292102a3d3794acd134688e401fd7a0769299f4dc2e1ec6a1cc7a5d7dbee91e2dcc2060980c9d2e54804831ee5bf843a69b58f6dfa64c2cea4fffa32e3e912b496e28b93f0553adc9be9f2a3a9d8715", 0xaa}], 0x1}, 0x40) sendmsg(r1, &(0x7f0000000ec0)={&(0x7f0000000280)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x2, 0x0, 0x2, 0x4, {0xa, 0x4e22, 0xfff, @mcast1, 0x7fffffff}}}, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000300)="fc1bbd78a711dca0284b19d2e5f181bb161e81f5d2ca93e8b28dfe9b56cb371d052af126c63dfdb106dcc7704d77bc3b4e755a329ff276969e41f22b354fc88052ed51ab", 0x44}, {&(0x7f0000000480)="7645f22e10bad19eddf25ab4f852a3f5655d4da253b83686ec462945706d3681b8b491d13908027f4e2dfa2b4ca4dbeb687bdb2c564a42007e85c4bf9b3bc55796d7a3355e4e47b184ff02992c51576630ef2a088ebee65573bcf7c962903841b3e19ac198fcbcbaa42bd411031b28fec807b163e01cc2d3efb9516f1468482e0920333d76f5766db62753", 0x8b}, {&(0x7f0000000540)="e10650a29d71cfc4f1658e8292c6417eefc051f57806b7757b32e54dffddd5569845b4fa1d436cc68ab42a4780e5d4023252de9f57c10991f9352c36026d8f9d28e13962d723798a41a7c396b940e873a58ce57076b1359c4860c2af77638471073599d5912cf7c2e9de31289b7bf1bc893222e5367a3124d7ad3324ca817647d8d7a36f6427ecabc28bfa5af690657b8781f6ef540e4f2c86de761d70b73c6cbcf4edbcf88303ffc8e7c252f1cbe70524ac66", 0xb3}, {&(0x7f0000000680)="f2defe119be1a49aa07de42d9018409c39036c9f2f010037e0f167e989efe70d3566f008d5b90101a9c3481c1edc5b01bfe2d623b024618eddac0be7679a7b420b0090a50eafd81ed3c37d939445c8bd393ee80fd797ea7a5f53cf7a73c8ca6e68d0080bf02f6ddf90440da3a5913e11f3cdfb69f7c72da008bc25789ddb467aad75967e16e1782430b8ef8cfb3200"/153, 0x99}, {&(0x7f0000000740)="0c87ba5ed4335939019fd582ba8a1b9cee070b659b7fff0a824390a6aca8678821619856dad6d46fff5c6643d2c49b21486464b0e59adc1baa4fe1432888247800ee89360cdd2d7da218dceb63300f6f3383edef641b64a3e3a00f967d796a6dfac98469d17abc", 0x67}, {&(0x7f0000000100)="ad246ada7cba4ba77bd3ce42a77e6489334f7893085a73834650570aa24a928975268984e6cc46d6923bc66cecdd4fffff716ee04500d1", 0x37}, {&(0x7f00000007c0)="0ac2612451aa4fae32b898746342c6d28d4e010f2ad26f7359991b146a387b260b24d4cf21838f0dc4e1bb042968f09e967d40ed1c4b98dc04000c214a6bc9a4eceb2783bb181ea6c1b93cd9fa7f5e49138a018fc10d958c06237483cda8d3f40b57e5db580b0f22ae13ef3c0aaaf98922c698e7bb93651700a94b6c92660dc3db16b1e558812166fc45ed1b823ea4051d648afe", 0x94}, {&(0x7f0000000880)="3b4604177ac09f256d41dfd00852acbc71e151695ddbd71103c14e85f0145b59c45f09bdf4e0aa35238bad7b26535a04930884af04428cf67b2cba59ed2dd1b39ee0", 0x42}, {&(0x7f0000000900)="a08222acf7a6efdba32e0aa997506aabcad8aa33fc19969ca58919dba21005ddbc9be4e1674d4a63fbbfb63bde2bd432bdc933b194d3aa2477437537b35665fefd0bdbb9b18b609df1cf6d0ff13ec7ab2caad4b42978c4039050ba70fe2bca44f410762604868616a61e4c42a04c1d2bfea56c8986c20fd8a81da6fc53cca1a37476c26a4aa42f0f3f992c685084b609c99566b018577a66d1397d9877824d", 0x9f}], 0x9, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"/1080], 0x438}, 0x20004811) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/cgroup\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000000c0)='[%)\x14\\\'*\x00') 00:49:29 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x0, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:49:29 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0xffefffff) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) [ 1429.905609][T15202] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 1429.910545][ T37] audit: type=1804 audit(1632703769.959:576): pid=15201 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2310/memory.events" dev="sda1" ino=14590 res=1 errno=0 [ 1429.949419][T15202] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 00:49:30 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = getpid() perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x2310c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x821, 0xfffffffffffff191, 0xfffffffd, 0x9, 0x6, 0x0, 0xffff, 0x0, 0x1ff, 0x0, 0x1}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x7, 0x62, 0x1f, 0x9, 0x0, 0x5, 0x4120e, 0xb, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0xfff, 0x1}, 0x1, 0x0, 0x2, 0x3, 0x800, 0x7, 0xff, 0x0, 0x1000, 0x0, 0x2}, 0xffffffffffffffff, 0x5, r0, 0x8) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000200850000000f000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000001c0)='ext4_sync_file_enter\x00', r3}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) [ 1430.294928][ T37] audit: type=1804 audit(1632703770.339:577): pid=15201 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2310/memory.events" dev="sda1" ino=14590 res=1 errno=0 00:49:30 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="44f000002200050ad25a80648c63940d0224fc60100002400a000a00053582c137153e370248038047000000d1bd", 0x2e}], 0x1}, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0xff, 0x63, 0x7, 0xfc, 0x0, 0x20, 0x20, 0xc, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x400, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x18430, 0x5, 0x245, 0x3, 0x101, 0x7fffffff, 0x0, 0x0, 0xb97}, 0x0, 0x6, r0, 0x2) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f00000002c0)={r3}) sendmsg$kcm(r4, &(0x7f00000016c0)={&(0x7f0000000300)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast6)\x00'}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000380)="a4860ee622ffff24c8dde1f54091a2b7e95a97bc708791af5bfeed28b1f728aa4c28c28abfcbc93311cb7c85b561321aa458487c4606047421105bde0934835e55cad48f14e8abb285e3e69951953add47b1c50c067d2aa933dc54f1c392013077ef8b19ed46aed605a9bc208080f8775f54a590966936a338", 0x79}], 0x1, &(0x7f0000000440)=[{0xf8, 0x10e, 0xfffffeff, "7e4676e9e3867579dff748136aa34113d43969ed49ca4cb7f400f02f53b2b4d720399332903d41f78046f73b5fd842b2a3dbe73cc36f01f0327bce7cf398e77253920c477c9ed2f672f424a0f99255c1dfc1d083b346ab05591cf760b8ae5f6a6c0ce59b00ac93f110c699b1544755436e409bb395e1c115ac4a5a1ac61b47d77212eda00b6d3122b5e1465d3f3c77a64e2b7c1145503e8828c6e7778675e592aa2a1b6c57eb2022334fd764a94210bba3ec79b0af15ec860ebd6511b405f93b6f71e837f8321b4b7de00fbea933897a3cf6054f574430de8bb3a9a6ced545bc91"}, {0x1010, 0x107, 0x8, "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"}, {0xd0, 0x105, 0x9, "0dc185e03f1aba73d98634a129951baa9d5c31da9499b93fbc81444f8f242e2e6150b76d54b9272cf99542faae3aae0b11e5416974bfdfdff3d7f6a5a18bde692640a02877a60b95d3a87ffda2fe3f857ce425277a155e6dcf4f7ac046e7a72fc354ca9b9241b8da262942664d594469133ef90760c421e9ea7c77af5b82a82ff2cb0abca1e3a09bb5e19a6e039bdf3be705bd21ee714a9add0f9016d2377769377159867daf1501658fcd17e5b48f40c3df9baa1ed8c223ef"}, {0xa8, 0x107, 0x2e, "578b166a1192cab8a6750fe5cd6a34e5d5f7c22718233fa83db6645a0cb7a8206e13074f94c5136762aaca26f3b1d038e182132cac02f48598b0b83ab5adfaf180abd5f08f7167bf8ba40700bdf63ec5aac2548cbfeebc6fed276b9097a19d332736ea9c7d85277d8ab48b15a4c11f1fa032db844f7b93232f2eddd97b6b2820088229bf162662fa941f9e036a84911ebec28b4776f6"}], 0x1280}, 0x40010) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x4ea00) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000200)=r3, 0x4) perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x2, 0x3f, 0x0, 0x8, 0x0, 0xdb9, 0x200, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6cc, 0x0, @perf_config_ext={0x2d9a4474, 0x5}, 0x40000, 0x101, 0x80, 0xc94600d2e9149558, 0xfffffffffffffc01, 0x1000, 0x8001, 0x0, 0x6, 0x0, 0x5}, 0x0, 0x8, r2, 0x0) 00:49:30 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) [ 1430.936239][ T37] audit: type=1804 audit(1632703770.989:578): pid=15224 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2311/memory.events" dev="sda1" ino=14597 res=1 errno=0 00:49:31 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) socket$kcm(0xf, 0x3, 0x2) r0 = socket$kcm(0xf, 0x3, 0x2) sendmsg$inet(r0, &(0x7f0000003780)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="020b000002000000e4a17c5284000020", 0x10}], 0x1}, 0x0) 00:49:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0xffffefff) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) [ 1431.048853][ T37] audit: type=1804 audit(1632703771.089:579): pid=15224 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2311/memory.events" dev="sda1" ino=14597 res=1 errno=0 00:49:31 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) [ 1431.390814][ T37] audit: type=1804 audit(1632703771.439:580): pid=15235 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2312/memory.events" dev="sda1" ino=14587 res=1 errno=0 [ 1431.560464][ T37] audit: type=1804 audit(1632703771.509:581): pid=15235 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2312/memory.events" dev="sda1" ino=14587 res=1 errno=0 [ 1431.860381][T15195] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1431.880374][T15195] team0: Device ipvlan0 failed to register rx_handler 00:49:33 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x922000000001, 0x106) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001980)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='memory.events\x00'}, 0x30) r1 = socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x5, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000001c0), 0x4) socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000004e00)=[{&(0x7f0000000040)="2e00000010000523d25a80648c63940d0300fc0010", 0x15}], 0x1}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'netdevsim0\x00'}) socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000280)) socketpair(0x1, 0x80001, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x8, 0x9, 0x3, 0x81, 0x0, 0x401, 0x10000, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0x8c, 0x205}, 0x89502, 0x5, 0x1, 0x3, 0x0, 0x81, 0x0, 0x0, 0x7fffffff, 0x0, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x2) [ 1433.235403][T15215] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1433.252591][T15215] team0: Device ipvlan0 failed to register rx_handler [ 1433.676994][T15203] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 1433.693202][T15203] netlink: 162792 bytes leftover after parsing attributes in process `syz-executor.1'. 00:49:33 executing program 2: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) close(r0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xdeffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&\x02[\xfe') close(r2) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000380)=@ipx, 0x80, 0x0, 0x0, &(0x7f0000000540)=""/137, 0x89}, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x7f, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x12840, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x1}, 0x8086, 0xce9a, 0x1, 0x0, 0x3f000, 0x24400000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xf) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup(r1, &(0x7f0000000640)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x16, 0x5, 0x80000001, 0x859c, 0x12, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x6, &(0x7f00000000c0)=ANY=[@ANYBLOB="0198feffff00000018130000", @ANYRES32, @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00'], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x3c, &(0x7f0000000240)=""/60, 0x41000, 0xa, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x9}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x6, 0x1ff, 0x9}, 0x10, 0x0, r3}, 0x78) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000040)='.+![+-.g:-#{-\x00') 00:49:33 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r0, &(0x7f0000000500)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0xff07}], 0x1}, 0x4004044) sendmsg$kcm(r0, &(0x7f0000000300)={&(0x7f00000000c0)=@l2tp6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000040)='\'', 0x1}], 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x7ffff000}, 0x3000000}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x1}], 0x1}, 0x4040060) close(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000d40)={0x2, 0x80, 0x1f, 0x0, 0x3, 0x8, 0x0, 0xf5, 0x2220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x2, 0x7, 0x9, 0x9, 0x506, 0x5}, r2, 0x2, r3, 0x6) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x0fF\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x6, 0x2, 0x26, 0x3f, 0x0, 0x3, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000800), 0x8}, 0x0, 0x9, 0x4, 0x9, 0x0, 0x7f, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r5 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="0500000000000000bc10000000000000ee6c08394c2717ef9500000000000000b9f3f329af86356fa35f78ea4b52f08c23f7d6953768319be2575f917466b7a2d5a57707b45f3698dbfdceecca2b6b4db52a679862be3f1829885ef4462b1d227e4b5ccb5a55eb3348435ae488e0780ed2b1f88f0b9aac890f4dc52bc73665470fcbf8e554cc1a9dfdd8cd2bdd3a33b08cd66fa61154f17a4638ea332bae63887eea22f6aba53d377932579a0509c5562b4e7ed3ecc6cb832c631e5252ca81c290d9c138c26584329e39d99cc5ff0dc1a1"], &(0x7f0000003ff6)='GPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0xa}, 0x48) 00:49:33 executing program 1: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x110, 0x4, 0x0, 0x239) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x55, &(0x7f0000000240)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0)=@rc={0x1f, @fixed}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000003f00)=ANY=[@ANYBLOB="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"], 0x528}, 0x20000080) r1 = socket$kcm(0x29, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000004c0)="626e463bc360eed6232390f8bf3910fe2874a7ef7318f88c61fbbe5f2c5bcfeb730c47a8423351eb67807f3fe418c646946fb80fe61684643aa777f6a15f9d9be90af70293b736412d81c631c913f385dfa41ee58788ea677d452413a0af784fdfb42e5617524f09821ff94d0dcf9be05c91b275da0609f6c4be97d2179fa1b34ad13f02da75511e47e263434e79d4d4e1753de7038dce2fb405f5d2116862f42fbcaedd73b2172ee90e03bb4b6175d97f60665d20a6bbd8c4806b2081499763f5c34ac7f4b62de3825f9c9aeb5a20378ab41d6785", 0xd5}], 0x1, &(0x7f00000019c0)=[{0x18, 0x100, 0x4, "c30c781d5842c3"}, {0x1010, 0xdafb2568d0b7d3c8, 0x2, "9f565664beca34f84d529c3e4cd4c4cc468447eaee8411cc44884ca11eeb8261070292b8dd0054879ac89991d5f88d1681e017d4dfdf831c2cc6689487d82f6f426e8a5bf73b10a44056edcd8e841f4e26d158f1646ab36866a20a370cb8bce7debea73d127385759dd646a42fd91c9bbb71b904784acd96618f01a823b242a2bc0aeba0e7400418fd1bc0f473113e57979e537df048723c3e23907c00a3e51f2a0bc7235c2bf4ccb7f328124711ed4c3f9d119b6c27cf73bee23ca63fe5c7c1cdd91bab46c4ff1d7691fc6b39165011fa5a3a4ec5827990fac99e4033b591c1e4aa5f01545c3702a8ce88465364de260c13472b9a3e0ebd55a3ede81c44c4c22f7d4b7e70050b829c936a4853c7085868b8f612129d487b014a5683ab2c0deb4f5b9098487f840e9aca721095932792c6f52fab4b831592ec0bddae63f3af53280c0fcd0d6204eaaeb827c3be2792f1ce4734a38ba740d8ef4985bb67cd580c996e7fc694b1186b17bb5c530c6e270222a21f95143597166d5c1056a3584dc48a2f8ab290d9468cf58dead09497be8a4bfe3e3c8c4fc08457e234863a0780f7667eb4d7e22aefe932e0822d17e9addc21bec2fe648aadbafd81071c9727b60c32c726fc03ea6cf3875f92b5f51f99f517e42b6ab5c9e4f86b8460974c96a80387d46143458941116312693ff37d87d0c4be20b11f9b3e9a45f6475d1b34da1c0d10a1165b4f430490670c4fdd4b0073a0a33063ac59140f3de8f5e022d2276eb6895fb2ebd61db49b8394eee7a0ef58b24312bd7ccade20a886249348204745fa4b4341cfb9d916519695f52ab6fa735fa02a670fd15e6d1a5984d9c73c34314824acf36dc09f8e2a8c88d28f2c999f90e0586e4ba67d5df4635d7a3f8fd02e05b45afd9669bd32de06eee64e306fcfa5a203699114f673525e2171a8c40700f8d55a35789cf301da45b0c30b5a56a7c8bf7019429593568c3d178fe6d3d18c9bc8fbd471eaff4a90442636f6b4c2727eebcb9f47d180cd828808b66738c15500028412abbae2e1142c78d4a98bed3fa1da51518bb7c58034f38e69e2d89db1dc8be27ddd1367f68e6e088e6e088119ba1eac0e3d2ac302e6cc0e4c35a40dcd4cbb4f7627ab778ba03a542ff772e422c8f0d724356467187d39c3c7a47962d3031245661ab3cc87ee30cd77f7264654594176de80de772fb93f7fb239ef7929f1ab1e9a6d1b53fb0085a2d7a0cf959cea3e37be90b53ca1d9810f33fe9d17e8fb2079a0edcfb418276674f30e672196233460a680acfbaa3dbcb551d9fe8497dbb46f11cb95ffa52b7921e0993bb5d5482d78e6ddb874e24b600017906467f015488504cb5a01aa11e89124fe0dd6f32fba5e100a09006ca7a09ac98f44784ca1089d5c798d5d765b6d589c4d26c30c543e3f10616b3e3ac348b2b3dc2a8254be56b1347c7ba1f860b621a55390b4bf709e8946078ace6578958aa0b52515b4e0e01bb0f8a91d4a627982046bcf9a25b2772604400ca4e30f01d2a0c59f756bf629341dad7675ca2ae678b6452b4a279223c36401594e127d368ee8acd2425464fa57d12dc3e20797c68f5cfd3a6219cd210ecbf4812a91e3f665c4aac83d4b2549f12294ad69d8246e6ff7d4eef5ca2c0ddef66bccf05d9f4bf9bc1455ac1be2667630605ac24d40d3b2df08d372e338051c7fe22a031affb053e91dcd6dfdfaf421e6a77d479f6ed33290442a03f8d16eb6d0ab49b8f50e6f63d0b3ce3bdba889b8f579c73bdf739586e9fafe131defa5722f716f01b0d57ddf01605426bbe1af74b7ad556d197f730bbe0e32d14b132e70f3c90fd12d3578460879241c50886c73fb3006d55ea99fcc8154789893a0ac7f62817976a0d36a2fea3c2c259a28378ad1be22eeb80f88d57b2bb3df1745487bc0d573f7a9beb8505b8ee3dd26b274a0a1786950dd8086c4fcf12debfd73110994fcf0c6c9d4a512c4000b08aed41c9836766c0ccacc38255d378eeb063cfd6e2786fcc5e711e836137037c2f9dc7173f9aa3754de8e6cc3f1e35aa9055d5944f60ed78a7c8dc085ecce81fd638f57a0899a3626039fa288f4b8b26a573c31b2b19ce31f21207e07302d5c13fe194b0fa49f6061df5c82627137d4655f10083038a27472799c28e760e77e96eed25eb63ec470152d2af75d793d152a6ee95a9551702137b8797f8b9b227523e69399333b4ecbbae316c79c45154f174c0be77c7d0531737cff43685bc5cdc4399b3d08f8f0dfefd20e2c067c10ff387ad86748ec3dfd5cb100c23cb2a5ae079d6ef67cf73b766b5760e05ea4eb43a24dc53cbba82c46cec9720b277a2206e2ccdd8ec1013d1a3b294256a97e949a30bb26fa20d8431b4f1ccc9ed8ebfcadf9e130701a1b9efcc6f0ce8a9e7b3ebb5e541da0d67453f94ad2151c546fc326af0e00b42b72baf0df21421c1c8326319bca849e22950bc4c80afa056732bdf5fe8fa12e54475f06bb448f8f76db1f23263f0cf8417a718fbd012b563f76c7e4f048c68738909364c2b34c4e08f0335962cef4eedd9868c88b15dd7ee07a46aa1324630a413dcfb8c0a68bab0fd0c6266ef4554a69de8406c1c85279974f13512bc0d6c3ddf5454110e712862c635ad8eab4de0d6d7968f190c54fed2d67d137bb1a294c1ff541aa16db250c804ae477fa1bcbdeea46060da4a1cfa6e8d8c808942bb93838ecaf01a578683e8c7bf2ba9982795cf0427ab4bb0e937141e6aab93558f2b1cbdffa31d35fa4a219049fdbc43f29ab30ef8e95a585a91fe52d5f1ce110c9bd414fdea3d6ca58d919469daf2322200949276281b9b4c755e11d8e2fe06fe61dd49902188f944220629ec1a8fc3a8d0f55db4325eecd2cc5a3e612e11c02b17ff1ebb2c56e4b6dee4822d171ea4da10b7e46681ee05073d23ad77231bdf125957778cf8fcb2bb76572982db1024f5616bcdd21eed9e12592dc3d2cd925873f64ef093ee6e51d4bb5ebcf2479b03cc806fc7f6ab7baad10fae714e1f0c7bc12944c32ea7d1ebabcac666b7cfba6a575bf9e901678628f5bb1a8a3c0075e8db4fe193811c0f0bb686cebfd28e0549f1235b53d1d237da5bcd09a5149b7f435c08255e1226a86c93a9aee51e6e3330dc03a9d09dd56e3d421e154bfb3a7793336a5a26c66faed056507c3d0710169a64d84656d96ac6c49d67f543b4c7f7c00b1e10b87429eaafc0b70d375b8bfea066907f517b452345c321a0c5f4bbb892caba72bf4d70a15bc57ca41e2a1703639a388f445e5fc978367c25e0c488080eb01cd7d3837483f236c8f5561080dfc428f482a833d9799c6301e982f8e2b41a37eab5e1be4dd3368719b6efb605318317f81df6099fbe711748b2bb2b414c277c300978fe32d6a07fb18ea1b6e44bfbbabf02db4fa7592fc389c27ad15902009b0b6fc6e48d71fee3b6a826ec92efcb3d81edd9e3ed389433500bbff4f53a02a62ef2bfb7e2e0a8f2ce934f42a346bd3432dfcbdd2b22fd6b76801c088a2fe5c5ae02fdeb3f33209e0a12b3937adc2451120eca9790b9bbcab4de08bd9052c23de8670156e3c25d48762fb46f6e501f65da224853cfdac3e6d4c577e2fed18dcb735e7ef4988b1d9fe4c1fab3b10fab3d7dc97ba897c90bedb3df8a0fe838100f7e4d7d2e9bbc6ef5d8008fbbc6ca3a0f54af5e0baf0fc07784eade491e87de35f64e22d9bcd2bdbe693bc5ad78a66ceb3d386a241d2aa5f2e148280dd7d56cab1716d912508475400bcadfc239e6163824147ffadc37dddd936f05d4c2b35e5512368fd44c6a04a62ab34545f18df771f6c941d5c21b8458017a7af47eeb53c18c7281b8424f1d5f820d0df79009068305e6e95b239db1a8913fd15e5f1f17e688f5fe63bf16deb821ed37ebc2e47741cf970465716838dbb8944eb40953b77442b58fe696ac60429974b086c2da43f5894c48e38ece2e1a522b444feeb1ac178b38346f0c3c6e6d95c9d3d6262fbd817543ec4462c5cd2ba520cd252b44330597948fdb47682f6c69f0e69a1682acf845d526e7f55049d6fb1bc547b396c558100d2377e64ec07784cc365a37befe6eb547c977fd0295ef6f2f2081560b61276dec75eac568e022a6ff624f113b7f953a5b6528dbc8cae175fc9f67da38a6231ff7a7e47ede7e96d2f97f86a486ec52d7ba6a594dd8cd168fbdac380a0bc5e227d8878fa908a29e0ee130802602035bdf727c1176c36656024d284f33b775369c7ee52c21d40d633742e6c59a4ad9c6f9644595cceeda688aacce90edc38f82b1867b81e7604bef73df70e193d49139621c997d1f3aefb04e4979b5b0c57062e849042bc427b0ecad916de7869be5def747155f920997e4eda1c26e061bf56b94733f2b878353d74e68b437f14f955514523c20850332e43a62ae76ece8b0855f572c1aaa42a8cff6bf8b23a7d2fcaf7a6860e342aa35a53cfcbf353bb58a71cd244c51f30aa27aa169e2d1910138eee0d9851da3d156a40230ff5a77313aede2b77a00e54acea2e1f5b856221447fad26e0356f44f55f381b1328e1e72bcd2a10a94272c0b873642555b14de66e6f31a91fc94aa5efb93e626ff085582bd1a72a894dca5ec137220e21f623549ff995b1c79b163ffb1a0d23d17b978f89febfd793881ffd185051bdfe2b01ee535865bf36c4dad7bc85d69fec3ffdcf7961dbbe3d4ebcc3c9a71bd5c4109bec7588659d19437c985d0522c8effbd069e826ec4e5bac47660c1c9c2259d95427d5db4f298e8a083c05f0c6b9d1ccd9bb8c3e80aa438d2cce545cc58fae9614130de49d1984aaad8c85d0aeb4b0f69d543fa77d7aed76d1fb117cb7f00d2e554e946ffc5b978af27b036479b7e8f0e25d416d08370b4cc75c33db094e8cb15dd142980c3099f7f513f11c9bea74d6becf76c67f805d5e9a5c4b6dacfc80b6a4d0ce1721a6a728129c1eaf66572d6b1204f9e54df907cc20d9a81a28348761043c527e765e7d1609560dd896eb049e9aadb7d0f9102f0f89fd296949a41c3cc40554b77a657d2865accf814b2b807fcbbd4c76d6ee38315465019c74eaa7efa01d053659038054baf32829cbee59b84c133fdf4f53efdb60bd6f90795134499f7e0657bc31a8b87b350d94c6690b67b58d2000f4b7e2ac010dfbfd2dbec7eb0922ce225f49421580daca58415d2b0aa36c1a3c682d5c40ed289b4faac59329605cb22e1ceed0e6976a796057d417ed8f15a54db72f4d500327b9774b05fa6805dbb292b22bf9139cfb8a77823435fb80e9da988e7ff2439b209ff187949dae53ee9a6d6c068e92893db69e3c78efd471fc77ebe9666cc659bcc3c9c50484477c2693e7f2e54be10a3544e83d382a2fd418eb30a9eefe8b6bb6403bf8f17167bfde2d65f7d9459f537e5d61845ccdfd24f0d37fc724a7f0e81e1f33a6a0ddce653a2c7e1ff5b783d7441e3fffe4da2d48cbefac61e2504ab37b2a4b37ece57d0cec0cd59017ef051b5cd77cb44bcccbd8297dc52e50b9c7b594855f51c5940d5609e585c02b7cbd84bd92d19d1afdc4bb8383aae09c97ffd84982e62e056ec6f619f47fd98270d9d94a2ebd189ac1639348839f7c789b174da3861682b0ad6b1564f1f47645b9568c09177f301cd2d323911a323df6b825e2f158500730cb4a0e8ece78b212299fd020f14ea5388a3b02929518e7597c5f8d9ab96e8f4aa64523056c734681f15e425c213d80aef466a4bd939b1efd32133e3d114e36caea880016b0f76142e6f49e5dd2dc266cc7303735a4ac"}, {0x88, 0x10c, 0xffffffff, "cdf307f5256e4cba8c07ce858ad30cefd35e1f7a7826c2d85d7f5f47748645df6a9a4a650adef95aa1c053c0373c8b802bc4bc06e6c026780244c52020d08890d12de0f82bac781e738515d08bd24460caa27fbb73f85dd022855a07bc450a9ee2c0baddad60f152f201734ed487bdbad9"}, {0x78, 0x117, 0x9, "e2999f3fd02430174d5b374d7f8d1862f83565e6ac59f1bb638707453df808dbf6f2b4797c7f0b3900ac4a99ae323b6eb628ca37a60e5317c86b709c143861ea97b5c1b206b84013ca07fa1142a637355ac85223a294d1f485fbd46c437b17fa42"}, {0x98, 0x88, 0xff, "6cc56a71dbae3f76538681143e4e5a71c41a1b1ed1a311b374e7c11db13d29814cd9846d45dff05b9235a57750d093890f1a881666461260c308cc0ea1679c809eb519f755cbf354086a6410e2fc4cb2a8a44b5e582ab3df2c5f7af75fa6497dedcead80a5aca71cd39d613d93b9bb7168a0aa9bf7219eb12b7c341541c55aeb9672"}, {0xe0, 0x88, 0x1, "1d4cab3aba05caa6e60c885bc1ce792d6dc490f3db18bc8a5f5ecd8f89ece6abd2ba8912149a6e6cdeba251128167579f659a4603bbdc35f799c9516147ee3828392789f1cf83288aba7a3b917e82c62f7298836d59cf4321a543d2aa2d08db7511e7cc1ef124d9a4bbcc9685cea5dfe9d7b0589154e3b8b5c888d3c7f3df3c0661abbc44db6d4f840546151a0f357a2068df492fcff1daeb4ea8b6a2fd4745cd71fcd732891fc8adab925714cf07802988e51427e76bf46a901651093d6470a1fef9d666a26b630a84d2d363a"}], 0x12a0}, 0x4000) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000280)=@phonet, 0x80, 0x0, 0x0, &(0x7f00000006c0)=""/102, 0x66}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001680)=@nfc_llcp={0x27, 0x1, 0x0, 0x0, 0xdd, 0x7f, "102340a675f3035789d8c12f1cc2b1ef9195122dc133d2cef71116f62e741212fba3bdce7b07e33df18b42098b4073ccdd11a3b1ca59ca67b384fe3bfdcdcb", 0x1}, 0x80}, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000003ec0)={&(0x7f0000003e80)='./file0\x00', 0x0, 0x38}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='rxrpc_rx_discard_ack\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x45, 0x71, 0x0, 0x8, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3ff, 0x1, @perf_config_ext={0x1e, 0x5}, 0x8041, 0x1, 0x2, 0x3, 0xffffffff, 0x83, 0x7fff, 0x0, 0xff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:49:33 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:49:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0xffffff7f) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:49:33 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x922000000001, 0x106) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001980)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='memory.events\x00'}, 0x30) r1 = socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x5, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000001c0), 0x4) socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000004e00)=[{&(0x7f0000000040)="2e00000010000523d25a80648c63940d0300fc0010", 0x15}], 0x1}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'netdevsim0\x00'}) socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000280)) socketpair(0x1, 0x80001, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x8, 0x9, 0x3, 0x81, 0x0, 0x401, 0x10000, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0x8c, 0x205}, 0x89502, 0x5, 0x1, 0x3, 0x0, 0x81, 0x0, 0x0, 0x7fffffff, 0x0, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x2) [ 1434.092282][ T37] audit: type=1804 audit(1632703774.139:582): pid=15282 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2313/memory.events" dev="sda1" ino=14599 res=1 errno=0 [ 1434.320326][ T37] audit: type=1804 audit(1632703774.359:583): pid=15282 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2313/memory.events" dev="sda1" ino=14599 res=1 errno=0 00:49:34 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:49:34 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0xfffffff4) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) [ 1434.893962][ T37] audit: type=1804 audit(1632703774.949:584): pid=15303 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2314/memory.events" dev="sda1" ino=14573 res=1 errno=0 [ 1435.090639][ T37] audit: type=1804 audit(1632703775.129:585): pid=15303 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2314/memory.events" dev="sda1" ino=14573 res=1 errno=0 00:49:35 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:49:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0xfffffffb) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) [ 1435.462496][ T37] audit: type=1804 audit(1632703775.509:586): pid=15314 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2315/memory.events" dev="sda1" ino=14573 res=1 errno=0 [ 1435.546547][T15265] device wlan1 left promiscuous mode [ 1435.642947][ T37] audit: type=1804 audit(1632703775.679:587): pid=15314 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2315/memory.events" dev="sda1" ino=14573 res=1 errno=0 00:49:35 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:49:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0xfffffffe) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) [ 1436.031055][ T37] audit: type=1804 audit(1632703776.079:588): pid=15322 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2316/memory.events" dev="sda1" ino=14607 res=1 errno=0 [ 1436.190408][ T37] audit: type=1804 audit(1632703776.229:589): pid=15322 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2316/memory.events" dev="sda1" ino=14607 res=1 errno=0 [ 1437.155284][T15271] device wlan1 entered promiscuous mode [ 1437.164718][T15288] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1437.173017][T15291] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1437.185391][T15291] bridge0: port 3(team0) entered blocking state [ 1437.194636][T15291] bridge0: port 3(team0) entered disabled state [ 1437.202024][T15291] device team0 entered promiscuous mode [ 1437.208532][T15291] device team_slave_0 entered promiscuous mode [ 1437.216315][T15291] device team_slave_1 entered promiscuous mode [ 1437.224367][T15291] bridge0: port 3(team0) entered blocking state [ 1437.230671][T15291] bridge0: port 3(team0) entered forwarding state [ 1437.239222][T15295] device wlan1 left promiscuous mode [ 1437.566220][T15306] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1437.580033][T15306] device team0 left promiscuous mode [ 1437.588587][T15306] device team_slave_0 left promiscuous mode [ 1437.597314][T15306] device team_slave_1 left promiscuous mode [ 1437.604309][T15306] bridge0: port 3(team0) entered disabled state [ 1437.618859][T15292] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1437.639697][T15292] bridge0: port 3(team0) entered blocking state [ 1437.648045][T15292] bridge0: port 3(team0) entered disabled state [ 1437.656571][T15292] device team0 entered promiscuous mode [ 1437.662150][T15292] device team_slave_0 entered promiscuous mode [ 1437.669921][T15292] device team_slave_1 entered promiscuous mode [ 1437.677653][T15292] bridge0: port 3(team0) entered blocking state [ 1437.684038][T15292] bridge0: port 3(team0) entered forwarding state 00:49:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x1000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:49:37 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:49:37 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x922000000001, 0x106) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001980)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='memory.events\x00'}, 0x30) r1 = socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x5, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000001c0), 0x4) socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000004e00)=[{&(0x7f0000000040)="2e00000010000523d25a80648c63940d0300fc0010", 0x15}], 0x1}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'netdevsim0\x00'}) socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000280)) socketpair(0x1, 0x80001, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x8, 0x9, 0x3, 0x81, 0x0, 0x401, 0x10000, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0x8c, 0x205}, 0x89502, 0x5, 0x1, 0x3, 0x0, 0x81, 0x0, 0x0, 0x7fffffff, 0x0, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x2) 00:49:37 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00'}, 0x30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6502000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x4, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x401}, [@alu={0x0, 0x1, 0x0, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x55, &(0x7f0000000240)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='pids.current\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001400)={&(0x7f0000000800)={0x2, 0x0, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3f}}], 0x30}, 0x810) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x8, &(0x7f0000000640)=ANY=[@ANYBLOB="05a0040008000000851000000100000018000000340400000000100002000000850000005300000095000000000000009d07fcff0400000019b007000000000022b66ff7a51fb96293a96a274281b804a7f3e123b2c33a322619b51462b11de0ab1d6075260011fba1a26ebf9dd55a6997659eaee1c573e6e83a28c9bba09d15752340b65211253a658e3476f0abf51c2591fb206649ac185e437de59b9984e432fa478c4818cf800a66daf6653b2b91c3ca27bdfa4ea7b9df4b509c9421b9643a7717c7"], &(0x7f0000000040)='GPL\x00', 0x8, 0xe0, &(0x7f0000000280)=""/224, 0x41100, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000180)={0x0, 0x8, 0x4}, 0x10, 0x0, r1}, 0x78) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x7, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e000000100081880a0f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8002001201", 0x2e}], 0x1}, 0x0) 00:49:37 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r0, &(0x7f0000000500)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0xff07}], 0x1}, 0x4004044) sendmsg$kcm(r0, &(0x7f0000000300)={&(0x7f00000000c0)=@l2tp6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000040)='\'', 0x1}], 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x7ffff000}, 0x3000000}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x1}], 0x1}, 0x4040060) close(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000d40)={0x2, 0x80, 0x1f, 0x0, 0x3, 0x8, 0x0, 0xf5, 0x2220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x2, 0x7, 0x9, 0x9, 0x506, 0x5}, r2, 0x2, r3, 0x6) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x0fF\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x6, 0x2, 0x26, 0x3f, 0x0, 0x3, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000800), 0x8}, 0x0, 0x9, 0x4, 0x9, 0x0, 0x7f, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r5 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="0500000000000000bc10000000000000ee6c08394c2717ef9500000000000000b9f3f329af86356fa35f78ea4b52f08c23f7d6953768319be2575f917466b7a2d5a57707b45f3698dbfdceecca2b6b4db52a679862be3f1829885ef4462b1d227e4b5ccb5a55eb3348435ae488e0780ed2b1f88f0b9aac890f4dc52bc73665470fcbf8e554cc1a9dfdd8cd2bdd3a33b08cd66fa61154f17a4638ea332bae63887eea22f6aba53d377932579a0509c5562b4e7ed3ecc6cb832c631e5252ca81c290d9c138c26584329e39d99cc5ff0dc1a1"], &(0x7f0000003ff6)='GPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0xa}, 0x48) 00:49:37 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r0, &(0x7f0000000500)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0xff07}], 0x1}, 0x4004044) sendmsg$kcm(r0, &(0x7f0000000300)={&(0x7f00000000c0)=@l2tp6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000040)='\'', 0x1}], 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x7ffff000}, 0x3000000}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x1}], 0x1}, 0x4040060) close(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000d40)={0x2, 0x80, 0x1f, 0x0, 0x3, 0x8, 0x0, 0xf5, 0x2220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x2, 0x7, 0x9, 0x9, 0x506, 0x5}, r2, 0x2, r3, 0x6) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x0fF\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x6, 0x2, 0x26, 0x3f, 0x0, 0x3, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000800), 0x8}, 0x0, 0x9, 0x4, 0x9, 0x0, 0x7f, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r5 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="0500000000000000bc10000000000000ee6c08394c2717ef9500000000000000b9f3f329af86356fa35f78ea4b52f08c23f7d6953768319be2575f917466b7a2d5a57707b45f3698dbfdceecca2b6b4db52a679862be3f1829885ef4462b1d227e4b5ccb5a55eb3348435ae488e0780ed2b1f88f0b9aac890f4dc52bc73665470fcbf8e554cc1a9dfdd8cd2bdd3a33b08cd66fa61154f17a4638ea332bae63887eea22f6aba53d377932579a0509c5562b4e7ed3ecc6cb832c631e5252ca81c290d9c138c26584329e39d99cc5ff0dc1a1"], &(0x7f0000003ff6)='GPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0xa}, 0x48) [ 1438.002338][ T37] audit: type=1804 audit(1632703778.050:590): pid=15347 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2317/memory.events" dev="sda1" ino=14620 res=1 errno=0 [ 1438.080186][T15351] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1438.114643][T15351] device team0 left promiscuous mode [ 1438.199505][T15351] device team_slave_1 left promiscuous mode 00:49:38 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x922000000001, 0x106) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001980)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='memory.events\x00'}, 0x30) r1 = socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x5, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000001c0), 0x4) socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000004e00)=[{&(0x7f0000000040)="2e00000010000523d25a80648c63940d0300fc0010", 0x15}], 0x1}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'netdevsim0\x00'}) socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000280)) socketpair(0x1, 0x80001, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x8, 0x9, 0x3, 0x81, 0x0, 0x401, 0x10000, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0x8c, 0x205}, 0x89502, 0x5, 0x1, 0x3, 0x0, 0x81, 0x0, 0x0, 0x7fffffff, 0x0, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x2) [ 1438.252362][T15351] bridge0: port 3(team0) entered disabled state [ 1438.272787][ T37] audit: type=1804 audit(1632703778.270:591): pid=15347 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2317/memory.events" dev="sda1" ino=14620 res=1 errno=0 [ 1438.374936][T15356] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1438.399207][T15356] bridge0: port 3(team0) entered blocking state [ 1438.427685][T15356] bridge0: port 3(team0) entered disabled state 00:49:38 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) [ 1438.650512][T15356] device team0 entered promiscuous mode [ 1438.675488][T15356] device team_slave_1 entered promiscuous mode [ 1438.738821][T15345] device wlan1 entered promiscuous mode [ 1438.750930][T15355] device wlan1 left promiscuous mode 00:49:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x2000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:49:39 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) [ 1439.484503][ T37] kauditd_printk_skb: 2 callbacks suppressed [ 1439.484519][ T37] audit: type=1804 audit(1632703779.540:594): pid=15385 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2319/memory.events" dev="sda1" ino=14603 res=1 errno=0 00:49:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x6020000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) [ 1439.651392][ T37] audit: type=1804 audit(1632703779.680:595): pid=15385 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2319/memory.events" dev="sda1" ino=14603 res=1 errno=0 00:49:39 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) [ 1440.019693][ T37] audit: type=1804 audit(1632703780.070:596): pid=15394 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2320/memory.events" dev="sda1" ino=14623 res=1 errno=0 00:49:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x10000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) [ 1440.207162][ T37] audit: type=1804 audit(1632703780.250:597): pid=15394 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2320/memory.events" dev="sda1" ino=14623 res=1 errno=0 00:49:40 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) [ 1440.669029][ T37] audit: type=1804 audit(1632703780.720:598): pid=15403 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2321/memory.events" dev="sda1" ino=14623 res=1 errno=0 00:49:40 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = getpid() syz_open_procfs$namespace(r0, &(0x7f0000000080)) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x80, 0x40, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x748, 0x0, 0x7}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x7, 0x7f, 0x6, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7fff, 0x1}, 0x42842, 0x0, 0x8d90, 0x1, 0x4496ead7, 0x2, 0x81}, r0, 0xffffffffffffffff, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xae, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf4&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x3, 0x80, 0xce, 0x46, 0x81, 0x6, 0x0, 0x100000000, 0x20208, 0xf, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_config_ext={0x5, 0x8}, 0x40806, 0x100, 0x4, 0x7, 0xce, 0x80000000, 0x100, 0x0, 0x0, 0x0, 0x7f00}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x17, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x55}, [@call={0x4}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) write$cgroup_int(0xffffffffffffffff, &(0x7f0000001b80), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000002c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) [ 1440.927043][ T37] audit: type=1804 audit(1632703780.980:599): pid=15403 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2321/memory.events" dev="sda1" ino=14623 res=1 errno=0 [ 1441.525431][T15358] device wlan1 entered promiscuous mode [ 1441.543487][T15371] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1441.558584][T15371] device team0 left promiscuous mode [ 1441.582162][T15371] device team_slave_1 left promiscuous mode [ 1441.588513][T15371] bridge0: port 3(team0) entered disabled state [ 1441.614261][T15351] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1441.633030][T15351] bridge0: port 3(team0) entered blocking state [ 1441.639625][T15351] bridge0: port 3(team0) entered disabled state [ 1441.664126][T15351] device team0 entered promiscuous mode [ 1441.669715][T15351] device team_slave_1 entered promiscuous mode 00:49:41 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000680)='\x00') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x40, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1ff00, 0x0, @perf_bp={&(0x7f00000006c0), 0x1}, 0x1001, 0x5, 0x80000000, 0x0, 0x3, 0x0, 0x400, 0x0, 0x1ff}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0x1f00, 0x40000) write$cgroup_subtree(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="2d702e1072a1ff0300006d6120a094afeafde71da483e187c4a7d472c78d5a538431d45d72d9d14eb6b6434ad64976420e6ce871d2a89daab8f20a29c3e26324a43e127a9fbb25a3b686c4b36d11bfe03678b4f0716534993ef9ae922a7a236f21c5b889fef5823d691b7563f6412cd0ec8518536081638a9f8643acd91628c4e4c8fd30199038a6ceefbfcb8dafd7c3597fa4aad1660e63df84c7081499da8a39239291cbf9f7b1f55713c4dc72e17d88aba21b07bd6ac8daa544b279fa058b41e338c9b4b597d66f9bf6f62d9295b171ab4c39fc6f1b0f0c95873211ef2e7c5dac3503759bedef5e0e3d124160b3df36a2be95b3063bf1bd946072c51586839cbdd9eb2a7b2a05680e70f182d76c9d77233d4156b23f31632449acef81ac3b47c5e4ad0855cd1255b104034594"], 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 00:49:41 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x80000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:49:41 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x7, 0x12) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x400000000) recvmsg$unix(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000340)=""/57, 0x39}, {&(0x7f0000000380)=""/187, 0xbb}, {&(0x7f0000000440)=""/57, 0x39}, {&(0x7f0000000480)=""/143, 0x8f}, {&(0x7f0000000540)=""/72, 0x48}], 0x5, &(0x7f00000001c0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}, 0x40010001) openat$cgroup_ro(r3, &(0x7f0000000700)='cpuacct.stat\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000040), 0x43) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={r6, 0x0, 0x1, 0x2, &(0x7f0000000280)=[0x0, 0x0, 0x0], 0x3}, 0x20) ioctl$TUNSETLINK(r0, 0x400454cd, 0x307) perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r4, 0x0, 0x6) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 00:49:41 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x33, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffdf, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) 00:49:41 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:49:41 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000001940)={&(0x7f0000000740)=@in6={0xa, 0x4e27, 0x0, @local, 0x7}, 0x80, 0x0}, 0x8000) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1c000) r1 = socket$kcm(0x2, 0x3, 0x3) sendmsg$sock(r1, &(0x7f0000000340)={&(0x7f00000000c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000180)=[@mark={{0x14}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000180), 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000004c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0xa, 0x2a77, 0xfc90009, 0x48}, 0x300, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280), 0x300}, 0x0) [ 1441.890024][ T37] audit: type=1804 audit(1632703781.940:600): pid=15421 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2322/memory.events" dev="sda1" ino=14621 res=1 errno=0 00:49:42 executing program 5: r0 = socket$kcm(0x10, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e04000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x0, 0x0, 0xfd, 0x0, 0x0, 0xfff, 0x5108, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000, 0x0, 0x3, 0x0, 0xfffffffffffffffb, 0xe5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = perf_event_open(0x0, r1, 0x40000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0xaa, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x2104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x200}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x6, 0x2, 0x1, 0x0, 0x2, 0x4080, 0xc, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_config_ext={0x10000, 0x80}, 0xda88, 0x18000000, 0x4, 0x7, 0x7, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x8000}, r1, 0x4007, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a1, 0x0) perf_event_open(&(0x7f0000000300)={0x4, 0x80, 0x1, 0x5, 0x4, 0x0, 0x0, 0xef92, 0x28, 0x9, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3ff, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x200, 0xfffffffffffffff8, 0x0, 0x5, 0x9, 0x9, 0x0, 0x0, 0x3}, r1, 0xe, r3, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x6558, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040946ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000ba8000001201", 0x2e}], 0x1}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r4 = gettid() syz_open_procfs$namespace(r4, &(0x7f0000000040)='ns/time\x00') bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) perf_event_open(0x0, 0x0, 0xb, 0xffffffffffffffff, 0x0) [ 1442.524634][ T37] audit: type=1804 audit(1632703782.540:601): pid=15421 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2322/memory.events" dev="sda1" ino=14621 res=1 errno=0 [ 1442.552649][ T3926] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) 00:49:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) socketpair(0x26, 0x802, 0x0, &(0x7f0000000140)) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xf00}, 0xc000) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000400)=@in6={0xa, 0x0, 0x1, @empty}, 0x80, 0x0}, 0x20008844) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x1ffffd, @mcast2, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="097e29bb6160322e86eb4143545a1ab1a988834ece1400250234364f0ea7ef1c0beeecdaa7e9225f47d0c4b728f8ab3f8c5cf45575bc4a006f0772e81bb3f6c5653e8840d39c59e73a4d1e881cc120e758444d75e37f1f8fc8589c2e0d33efba05d2cc92d2e41f5a60"], 0x38}, 0xd090c24d8aa01fe0) socketpair(0x11, 0x2, 0x4, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, 0x0) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) recvmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000580)=@phonet, 0x80, &(0x7f0000002f40)=[{&(0x7f0000000f40)=""/4096, 0x1000}, {&(0x7f0000001f40)=""/4096, 0x1000}, {&(0x7f0000000600)=""/198, 0xc6}, {&(0x7f0000000700)=""/90, 0x5a}, {&(0x7f0000000780)=""/158, 0x9e}, {&(0x7f0000000840)=""/88, 0x58}, {&(0x7f00000008c0)=""/134, 0x86}, {&(0x7f0000003000)=""/176, 0xb0}, {&(0x7f0000000a40)=""/154, 0x9a}], 0x9}, 0x161) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)='/\x93posix_acl_access\x00') r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffcca}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r3, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b708030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 00:49:42 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x0, &(0x7f0000000000), &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) [ 1442.726543][ T37] audit: type=1800 audit(1632703782.720:602): pid=15421 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="memory.events" dev="sda1" ino=14621 res=0 errno=0 00:49:42 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000005}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0x4ea00) perf_event_open(&(0x7f0000000400)={0x5, 0x80, 0x8, 0x2, 0x2, 0xff, 0x0, 0x20, 0x380, 0xa, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x2, 0x401}, 0x122, 0x8, 0x10001, 0x0, 0x5, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, r0, 0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180100000000000000000000000000e266abbf00850000007d00000895"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='ext4_mark_inode_dirty\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7ff, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x7fff, 0x0, 0x8, 0x0, 0x0, 0x2, 0x0, 0x2, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000000), 0x20b000) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r3) 00:49:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x100000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) [ 1443.057394][ T37] audit: type=1804 audit(1632703783.110:603): pid=15446 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2323/memory.events" dev="sda1" ino=14634 res=1 errno=0 00:49:43 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x0, &(0x7f0000000000), &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:49:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) socketpair(0x26, 0x802, 0x0, &(0x7f0000000140)) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xf00}, 0xc000) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000400)=@in6={0xa, 0x0, 0x1, @empty}, 0x80, 0x0}, 0x20008844) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x1ffffd, @mcast2, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="097e29bb6160322e86eb4143545a1ab1a988834ece1400250234364f0ea7ef1c0beeecdaa7e9225f47d0c4b728f8ab3f8c5cf45575bc4a006f0772e81bb3f6c5653e8840d39c59e73a4d1e881cc120e758444d75e37f1f8fc8589c2e0d33efba05d2cc92d2e41f5a60"], 0x38}, 0xd090c24d8aa01fe0) socketpair(0x11, 0x2, 0x4, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, 0x0) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) recvmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000580)=@phonet, 0x80, &(0x7f0000002f40)=[{&(0x7f0000000f40)=""/4096, 0x1000}, {&(0x7f0000001f40)=""/4096, 0x1000}, {&(0x7f0000000600)=""/198, 0xc6}, {&(0x7f0000000700)=""/90, 0x5a}, {&(0x7f0000000780)=""/158, 0x9e}, {&(0x7f0000000840)=""/88, 0x58}, {&(0x7f00000008c0)=""/134, 0x86}, {&(0x7f0000003000)=""/176, 0xb0}, {&(0x7f0000000a40)=""/154, 0x9a}], 0x9}, 0x161) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)='/\x93posix_acl_access\x00') r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffcca}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r3, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b708030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 00:49:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x200000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:49:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) socketpair(0x26, 0x802, 0x0, &(0x7f0000000140)) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xf00}, 0xc000) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000400)=@in6={0xa, 0x0, 0x1, @empty}, 0x80, 0x0}, 0x20008844) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x1ffffd, @mcast2, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="097e29bb6160322e86eb4143545a1ab1a988834ece1400250234364f0ea7ef1c0beeecdaa7e9225f47d0c4b728f8ab3f8c5cf45575bc4a006f0772e81bb3f6c5653e8840d39c59e73a4d1e881cc120e758444d75e37f1f8fc8589c2e0d33efba05d2cc92d2e41f5a60"], 0x38}, 0xd090c24d8aa01fe0) socketpair(0x11, 0x2, 0x4, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, 0x0) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) recvmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000580)=@phonet, 0x80, &(0x7f0000002f40)=[{&(0x7f0000000f40)=""/4096, 0x1000}, {&(0x7f0000001f40)=""/4096, 0x1000}, {&(0x7f0000000600)=""/198, 0xc6}, {&(0x7f0000000700)=""/90, 0x5a}, {&(0x7f0000000780)=""/158, 0x9e}, {&(0x7f0000000840)=""/88, 0x58}, {&(0x7f00000008c0)=""/134, 0x86}, {&(0x7f0000003000)=""/176, 0xb0}, {&(0x7f0000000a40)=""/154, 0x9a}], 0x9}, 0x161) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)='/\x93posix_acl_access\x00') r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffcca}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r3, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b708030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 00:49:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) socketpair(0x26, 0x802, 0x0, &(0x7f0000000140)) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xf00}, 0xc000) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000400)=@in6={0xa, 0x0, 0x1, @empty}, 0x80, 0x0}, 0x20008844) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x1ffffd, @mcast2, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="097e29bb6160322e86eb4143545a1ab1a988834ece1400250234364f0ea7ef1c0beeecdaa7e9225f47d0c4b728f8ab3f8c5cf45575bc4a006f0772e81bb3f6c5653e8840d39c59e73a4d1e881cc120e758444d75e37f1f8fc8589c2e0d33efba05d2cc92d2e41f5a60"], 0x38}, 0xd090c24d8aa01fe0) socketpair(0x11, 0x2, 0x4, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, 0x0) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) recvmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000580)=@phonet, 0x80, &(0x7f0000002f40)=[{&(0x7f0000000f40)=""/4096, 0x1000}, {&(0x7f0000001f40)=""/4096, 0x1000}, {&(0x7f0000000600)=""/198, 0xc6}, {&(0x7f0000000700)=""/90, 0x5a}, {&(0x7f0000000780)=""/158, 0x9e}, {&(0x7f0000000840)=""/88, 0x58}, {&(0x7f00000008c0)=""/134, 0x86}, {&(0x7f0000003000)=""/176, 0xb0}, {&(0x7f0000000a40)=""/154, 0x9a}], 0x9}, 0x161) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)='/\x93posix_acl_access\x00') r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b00)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68bff324d6c37d03057c90000866f55e3376e4a82071d7827af04f8426e5b0eb4642172797fc01200533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223f703a954af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bebd2f992112024650892c2e25b38f9cac849a62720cd661d21ab5d7a8b9f974b4f5da4b6862c01b4cbe5f279020000009f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a3401d604f415840873a0e1df38c8c7c9ce232542acf57c44faea190b98de36aa113dba42def9c5bc3c90823529860583d8fb2dd17279eafcbdb226c00545f7f7c4fa93603f2ae2260bb56cb1a542ab27dfb25f54b6f73e2da29ef6b6f33e099cd94987238b5b09ab1b377fc08135572dd7e7ae09d603115f1cde757c9d2fd838a84251cbe5f8e9e62fee4d1554fa20d84df5e107d368c139b5c17e916a990422a72150235ea93abb04521db134aad75b7c41ec63ca90e22c26a6ef512cd5c598330e07b18183e20f145c031a129aed2186d7a6e3cc00125abaf55b18a727bfc6616d0df05a684730e2f014e5400000000000000007d468676e6c0da27c75254f16c0680519c26f1a602b0df27df00e16af8ac465612353a1e4fc13dfb46c68acc6a000000000000000000000000000000000000dcec704f1e0f9343f76e783f980a20c15b9ad1eeebd6e9f5cb45422a075a7ec964d386fb9ba291492161cfa7edac599d6287f1873abda0c12a84f1345e7717e5ff08871f6a11d9d4829e6cc80716241c501b4298cb0a64299f0f74db2ad1ae0dc5f3ff080000000000003cde681e5422a4820e7c49568a9648414487e8dc65ae5d058966a307fd74264998b08574cbbae2ad9acde1dc4cd040c212f87fb2b80f08e00aa568e8cfe998523355df720f231b728e157f70761c12957d9443241b20a33d3ac117adf89ed477e847d55b2e7c6806ecfa2749f1cc9cdfce5c401e927e878108956a94a3d56d0ca7ecc3e37834731d25b3bbff407a7c5751000000000000000000b771b5decb1f2cd08db57c3ab6b173b3f8bcc2f024bda778caa820108ed5592aa6b46cae403ed45632c83c0f4224a3b8bb125bc0ecfc61464ca1b341d1eefbc9ba082d6af04485b15d53dc8e866c3018a431d6a396d338e711e86227aca6bcb72269cfde60a0a50b565d0174635f24cf73a37e"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffcca}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r3, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b708030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 00:49:44 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x5) perf_event_open(&(0x7f0000000040)={0x0, 0xfffffe0c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000003c0), 0x8}, 0x120, 0x1f, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x4004}, 0x0, 0xfffffffffffffffa, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='net_prio.prioidx\x00', 0x0, 0x0) recvmsg$unix(r1, &(0x7f0000000340)={&(0x7f0000000200), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000000280)=""/126, 0x7e}, {&(0x7f0000001580)=""/228, 0xe4}], 0x3, &(0x7f0000000300)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x30}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x4ea00) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x4, 0x40, 0x53, 0x5, 0x0, 0x6, 0x102, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x4, @perf_config_ext={0x3efa098d, 0x4}, 0x11040, 0x2, 0x400, 0x1, 0x5, 0x1, 0x6, 0x0, 0x0, 0x0, 0x42}, r2, 0xa, r3, 0x2) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000380)={r1}, 0x8) openat$cgroup_subtree(r4, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) openat$cgroup_ro(r0, &(0x7f00000000c0)='io.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:49:44 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x0, &(0x7f0000000000), &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) [ 1444.826200][ T37] kauditd_printk_skb: 3 callbacks suppressed [ 1444.826217][ T37] audit: type=1804 audit(1632703784.880:607): pid=15490 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2325/memory.events" dev="sda1" ino=14537 res=1 errno=0 00:49:45 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], 0x0, 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:49:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002a00810e000f80ecdb4cb902020000000d00000030fce3e512030000042fda1b40d819a906000500000f", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x0, 0x6, &(0x7f0000000140)=ANY=[@ANYRES32=r0], &(0x7f0000000d40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) openat$cgroup(r1, &(0x7f0000000240)='syz1\x00', 0x200002, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x108) mkdir(&(0x7f0000000200)='./file1\x00', 0x60) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x0) recvmsg$unix(r1, &(0x7f00000004c0)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000380), 0x0, &(0x7f00000003c0)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xf8}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000780)='\x00'}, 0x30) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000d00)={&(0x7f00000006c0)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000001140)=[{&(0x7f0000000740)=""/50, 0x32}, {&(0x7f0000000a80)=""/116, 0x74}, {&(0x7f0000000b00)=""/232, 0xe8}, {&(0x7f0000000c00)=""/216, 0xd8}, {&(0x7f0000000d80)=""/191, 0xbf}, {&(0x7f0000000e40)=""/176, 0xb0}, {&(0x7f0000000f80)=""/232, 0xe8}, {&(0x7f0000001080)=""/138, 0x8a}], 0x8, &(0x7f00000011c0)=""/79, 0x4f}, 0x10102) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x402862, 0x0) r4 = socket$kcm(0x2, 0x3, 0x3) sendmsg$sock(r4, &(0x7f0000000340)={&(0x7f00000000c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000180)=[@mark={{0x14}}], 0x18}, 0x0) sendmsg$kcm(r2, &(0x7f0000000640)={&(0x7f0000000280)=@qipcrtr={0x2a, 0x1, 0xc001}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000380)="7c275afdba64f65d7994ea5ce241d82562ca64fcc20f497fc304e76b4d7308b4329140b66d6fb0b0f4347abe546bfa6403123fcdd99dd61f96", 0x39}, {&(0x7f0000000500)="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", 0xff}], 0x2, &(0x7f0000000800)=[{0xb8, 0x108, 0x1, "1ea513792115e84329e8d0436ba008941488aeb535c1b37dd7ed5375ab175fcd769026e6b30c91d76fd3021240f99def6826e149d00d9d097d3c2cc6e622413fe8b9de14853b604a6ae1386e420ad0627b68e0b599aba8af0a7b624f5d19c4ec9dac01366d276549991a5b3f24fe646a2d7ea936d88a756a5b76ebc92ba5df7a0ec680ddf3ae2e334553173df0a0e2477fb611a8c6e521e0756b74ff90d051cf0bad610000000000"}, {0xd8, 0x29, 0x3, "9b2f34fe1dca10ccfcfd810872ffb8398303cdc0fda519085e83480f1f392a0c621583f71a69c241d3851eea4a6a14f63929b0069d7cceeeca2c4a13be12e8db8200bd10b7da53f3b30fbf9a15fbcebf8e255491ff3cd02dc051de6efc3a1a461aa9b29e3c4340e44dc6a0e434f3f0f6ca86db978b177a9afc9df46f1c4639c4032f9ae69dd28ddc42b3c3342e18adbd91dbadd420dcd656da02e67c73ae3f348cf08a35589cfa1b8ab95d27e30798b1865839417c414e5d89de06845fdfcd087b18a313c32d"}, {0x58, 0x29, 0xffffff11, "a6c2b8bc6c6767244c9395cc8b6580b028dbc5bbb38d96a3213fa1983744591c2c5b3f4d47f7cb83bc7345eb03be2398453abbeea25f1a1521d645331b0a01916dbecb"}, {0x28, 0x100, 0xffff, "3f642c5f3bda76eca78cb4746bd078d6816c7ebb"}, {0x38, 0x3a, 0x10001, "387813ff3281c72d6dec1159da458ea247deaa0c0c86691e221d6d40c9f5bd6b34e2"}, {0x18, 0x10c, 0x0, "6562e4fcd73b"}, {0x20, 0x107, 0x5, "b8a275302e98e7dd2a2b3db8"}], 0x280}, 0x4040) [ 1445.297525][ T37] audit: type=1804 audit(1632703785.080:608): pid=15490 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2325/memory.events" dev="sda1" ino=14537 res=1 errno=0 00:49:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x300000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:49:45 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) socket$kcm(0x29, 0x5f8158b223d8411b, 0x0) perf_event_open$cgroup(0x0, r0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x5e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={0x0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000500)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) write$cgroup_type(r2, &(0x7f0000000000), 0x20b000) 00:49:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_cpus\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) recvmsg$kcm(r0, &(0x7f0000000600)={&(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000014c0)=""/4096, 0x1000}], 0x1, &(0x7f00000001c0)=""/89, 0x59}, 0x40002003) sendmsg$kcm(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000300)="78f0db028b72e09db788a8d4869d0af653c991725b5e6dd0db82330b44f1c2f70afd5b9a74de8d7182f45ced26f4b5557179a336d7643c832abc1983809b4e1e0f7acb650d143b421647dd6cfdc74f8c127ce5aed539164b665cc9afbd02848ec4369c697fd4a680ff98334971edc296b107db144ec65d82c8a5959a5911ef9b7189201197cbb814afedd090bf977c1a92b9c672ba0933078ba278ff7756d3639fdeb27a8404c487549fee843fe61d5946c8e47517aa980656", 0xb9}, {&(0x7f00000003c0)="ee37816fcc4b6b97e8cb258f8a3650379f7fc6e856729e6d967207bc4eddc1e88da68018bda6a0360165adbadb4be7a98fa1e2f21b840f44022291b396047a060cae7c8781352812d01cd28ad9d9e64cbeb1bf727abe1bd6ee1a66453d6b50588c96442031f81c1ba75cb8c3bf66a6cbd9ac4ecdd2198f8425b5ef4ceb30570b2cf660916cfc42708997", 0x8a}, {&(0x7f0000000480)="82d03f4f291f79b9dc92af81bb7076011bdd6d6c77e9af0b1ed3ce4f41af4fd3c46946785b14ecff5424b87c38abfa1cec3d49ad76522682e89229cfaad8c2a33951e62e822530e71e26e07bd7b1c1fbaa83e874504a250f689db190da55f026cd52167c535a3256b22a3f70eb5ca81de422aab44c99d088bbb06f5a7e6c6e679be38affe7e89c69a95d9408aa9aaba99f4cf0db279ccd55ecab8aa722aeb22bf51ef184237220300087d1bbfc", 0xad}, {&(0x7f0000000540)="644c4ccc848e4dc67e220058bcd026154ce05eba9098ecf321e6dd365a5a3a906c6c38f81556aaa1722cb437882e8014a05d63dcaf5e23202f151345341731911f2df80c07553432bbc3d60cb60cbda178663ddd67c85b841aad258b06903f04e3da23731fe2976995de1e21615828ffa9ef640a766d3d799d902e2dbc128bd207d0ae383a531eea5bef99970aa92eee78da643e62cbc4", 0x97}, {&(0x7f0000001440)="6a8e0b2d037ebdbcd1817ca135abb28333f4b719c808d81780b0c3dd5da2f41672eba626bb4df07c0f1800e11e68f31ba914166c5b40512d949876e24bd864cfff35b8003513fc363c9bef825a258abbf55fc1be499879300b8857422e861b5f6693db293955a4f49647578712fee37b0cd67f8449f185e98c33eaded415", 0x7e}], 0x5}, 0x0) sendmsg$kcm(r1, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f00000007c0)="f3c1220b14733bbe882ec1", 0xb}, {&(0x7f0000000800)="ad9e9acac6a5d3d9688f84d79319791cb54cf9fbf22a95d7c706bc307b8948bdf43ed3a0dc6fc8d3ae22eab157eeb77ec324", 0x32}, {&(0x7f0000000840)="ea436168e6193ba44450460d192ef6b192a20eacf108df9b76ad5dc053be6e4898020166056004c62e88cd820d1d958c63c5cc66b1e0cb0409c61dc0577ce6e7b2f5e642a8e70c03", 0x48}, {&(0x7f0000000900)="1b95ebe16d4c4090a25f244ff7aec3617faae3f2d35c9f34d0a698070c57b01aaa5d5a3968f70f161d1a4e80c10fb299bb5390c49112b4a84e", 0x39}, {&(0x7f0000000940)="397ce9c1e58208c84f525702a5ee0d13c122a7b1abc96e3d3fc77373925aade2bde8f9ddab0b45", 0x27}, {&(0x7f0000000980)="16638f921a9c55e2115c2e50c1964fd73f1faaf3fc27aedd9a5c77a52bac1f654fd42dbe5f363d982b7b29c028f50ede5088e3b2ec14578d833705a4b1e15ed743c1f906a095e7550e54bb32f8e54a3d4d62b347676cf4c4e1681876627d306a53c191f14a0dd2bef1690db4acc949803b1fcd838f61449d57880f6bbde02572813f08e7e8a829e060e120d6d11b9458e057e749a812dc7b57ab588e4dc7649a", 0xa0}, {&(0x7f0000000a40)="cab0a62ebf0ead3f40b163a597bb8e6db71a7e28b1fd71e2a2ce0f109b2d2595d91d228f8032cbd50888139733a5dbb47ac9072ebd83bea958a0", 0x3a}, {&(0x7f0000000a80)="adfdd91290edbf9a51c55d89e2e591d78601ae7c", 0x14}, {&(0x7f0000000ac0)="d31c0772b058664bf5a6a575f7144a177f87c8e7538620c0d87133edff8f219b63d78decde76076a4606e7274078233b4596d7cd09c154300a284d79cb1366009fa4f225d52b8a41c76a766776ceee40a159ae61833b3c595f377c9698f32d517fbfbc985d383b8ab03cabdfbb0bdc1400b7a38a238ad5b8eff38182092f7cba7159bc30b3888632d90412b2e7fcac179097527a3a0195a72b2eb1bb922fa69c67b300bd8f9fa5c9b64291aed60027d6011e74f442d1ae304b", 0xb9}], 0x9}, 0x0) [ 1445.501096][ T37] audit: type=1804 audit(1632703785.520:609): pid=15498 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2326/memory.events" dev="sda1" ino=13953 res=1 errno=0 00:49:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0x1}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r1, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2cebdf", 0xa2}, {0x0}, {&(0x7f0000000580)="9e3825b4e7197794c5dae8bb805201abbcdbc060a740c1faa02746208577c64d886d97dd19e696caa512dd2297c705b550a6fbf9aca7f1e8484da02e903cc6b16c159f39a7f731784b6cedb1dd69e05c1c04ff6dd58b5869e41a12784b10ab7e13f7042ea1b7737549d30c044e4db0dc25707a0d4f321db139df4f7cdf2c70e6a548521232e0b36ae5bc0853a28a5250", 0x90}, {&(0x7f0000000640)}], 0x4}, 0x40800) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000280)='./file0/file1\x00', r0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file1\x00', 0x0, 0x208421, &(0x7f0000000800)={[{@mode={'mode', 0x3d, 0xff}}, {@mode={'mode', 0x3d, 0x567}}, {}]}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="e181000000"]) mount$bpf(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x108810, 0x0) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xa02423, &(0x7f00000009c0)=ANY=[@ANYBLOB='mode=00000000000000000120417,mask=^MAY_WRITE,uid<', @ANYRESDEC=0xee01, @ANYBLOB="2c7375626a5f747970653df72c646f6e745f686173682c7375626a5f757365723d736d61636b6673666c6f6f722c736d61636b66736861743d5b2b577b40ba2f252c7569643c", @ANYRESDEC=0x0, @ANYBLOB="2c646566636f6e746578743d726f6f742c6f622c657569643e0000000000000000000000675ce887410ee99dc2b71c2a22759f6d71a6685528521f3de4a9fc97f1e56423d615860410200da332bcd912caa47014ca6e8a25c41726c282bd7d8e5a02b99f73fa731923945c44e3787563e42936b25718e65d037853e0e9fddb0d8c213ab6a9a7eaeea7aeaf283bb64cd912139fc73fe6cc53056bedd4e814", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) recvmsg$unix(r2, &(0x7f0000001200)={&(0x7f0000000dc0), 0x6e, &(0x7f0000001140)=[{&(0x7f0000000e40)=""/80, 0x50}, {&(0x7f0000000ec0)=""/123, 0x7b}, {&(0x7f0000000f40)=""/224, 0xe0}, {&(0x7f0000001040)=""/232, 0xe8}], 0x4, &(0x7f0000001180)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x40002000) mount$bpf(0x0, &(0x7f0000000140)='./file0/file1\x00', &(0x7f00000007c0), 0xa0, &(0x7f0000001240)=ANY=[@ANYBLOB='mode=00000000000000000000007,subj_user=bpf\x00,permit_directio,smackfsfloor=mode,func=KEXEC_INITRAMFS_CHECK,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c66736d61676963efea68b95f0f7318303030303030303061350900000069643e", @ANYRESDEC=0xee01, @ANYBLOB=',fowner', @ANYRESDEC=0x0, @ANYBLOB=',euid<', @ANYRESDEC=r3, @ANYBLOB=',\x00']) sendmsg$inet(0xffffffffffffffff, 0x0, 0xa000000) [ 1445.725139][ T37] audit: type=1804 audit(1632703785.620:610): pid=15498 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2326/memory.events" dev="sda1" ino=13953 res=1 errno=0 00:49:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], 0x0, 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:49:46 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x43a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2, 0x5, 0x3, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) r3 = socket$kcm(0x2, 0x3, 0x3) sendmsg$sock(r3, &(0x7f0000000340)={&(0x7f00000000c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000180)=[@mark={{0x14}}], 0x18}, 0x0) r4 = socket$kcm(0x2, 0x3, 0x3) sendmsg$sock(r4, &(0x7f0000000340)={&(0x7f00000000c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000180)=[@mark={{0x14}}], 0x18}, 0x0) sendmsg(r3, &(0x7f0000000b80)={&(0x7f0000000840)=@sco, 0x80, &(0x7f0000000a80)=[{&(0x7f00000008c0)="16a8b55c3308efeb42e39c97ffaab89a064c96c3e37c2f5dc9745faa2cc233f3bdb2866342877c13a9d41a72319abe61a57a18c630859af0d0729e5f5637e4bc9e09271fa62231d76f944c4b5366665e5e7bf659594bcade13effce171f58b45cce23df2c25cf3ebc0", 0x69}, {&(0x7f0000000940)="0eee6451e5a2a802b16fc247db44297f9cbcea13aa0a6a5a5eb1b0bc799bf588b9273c5d27a02ace6a4c36c50f116f196eba866163e1f831aaafda3f5f88c42fcf23980a51a1ba8e054c5db8e7", 0x4d}, {&(0x7f00000009c0)="c76671cc47f50c34a9ef340a53e0d63f723ea64e413977d64ccb7d123132326b5c4353294e7e9243406dc7a2519a94c9e51e0061a9a93a1b88509c998821b5c0fdf01b72fc2a701a70f590c282639e323faf03ab3ac095281cd1292f97271c417d6c18601fd9466a55ccd9d3f4ba005f11e78308d8e5fd73aaa4b9a8080631e588aef8fb7c5230ab2fd0389a138c9feaadc230df301008de519cadce88717d165ed95e74", 0xa4}], 0x3, &(0x7f0000000ac0)=[{0x60, 0x115, 0x8, "312d3658cce21933a9c1aa19ad6916f85c9e9df1c736f067ac2469c9e9f6ed9480a2a4aa6b3743ef82029c77f30065b54fa586bdca0fa14a3f53f8ad9a5a5cd66e96541bdf9e639464"}, {0x48, 0x118, 0x20, "646804aae434fb6a292a31f8bd2cf14aefb15004863878c36a8a6af551c31da496575d25b6e2d531e59689af50c7264cc8751e3b574582"}], 0xa8}, 0x4004) write$cgroup_subtree(r1, &(0x7f0000000380)=ANY=[@ANYRES32, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r2, @ANYRES64=r3, @ANYRESDEC=r0, @ANYRES64=r1, @ANYRES16=r4, @ANYRES64=r3, @ANYRES32=0x0, @ANYRES64, @ANYRESDEC=r1], 0x4ea00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000004000040000000000032500009500000000000000d387777ab82499fd7a38de0cd88b09fd1d80585afff33091b533c720577af017450b2a886733ceb617f121d79e3628e72be0d39e77dcb16887214f541bb89938c19978ea22254c58d75439a1edfee2adfeaffc2d14ffab3ddc1dc20efe6f457c3913f273d7b48d10b9904fda943414bf2f1c68c4878937c8f83a5203d5b63a2689bccccbd486e66c4a5e053d3a9db4238ee52d47e704465a6a9726ba058bd85acc9322902c0200e50faf989fd44b66da1b795d04df0d9bfd21a6608880516f25136a81d6b48d5f205d0d44bfabd7013f8192a3028ad96441ba7db2c3e80f0dbf59164e8806259d3b7633f704b15c3dc9259fa3aa3106e4821a620600000000000000904c8af7cd704f4afa93fc61d6ba0e2148b09a28cd376bc43a1445c635c73a6bd9cda98b27f9981f6af46d74e057515bef88b90f987de14f2a9e1b07dd8b865715f25a4f95cc0024e18e96570000f70b24cee055e19cdab1a31b2f0fb51e0d9348aa80e2e60cd60800000088b06a13d14f14e829e4330e4475096c886864c5bf8be6441e7e24a4162d88a668b65bc80a10d3357cd62db832a98c116b0000d92a6dabe73e52fd78db326416f055e4f531abb858e1a4ee680c94407e1ee01d68139635ab636723848d90a40d2a2298b5cb3cbe8366b09957fc5ee5472fb7671f1b99a7b0508949eaf27f8d356e321bb3ef7bfd1c951fe85603ff909878b9db38af432516700efc72e3847e1e86967d2a12a357a69a6cd73b73cfff08965818b338e5f5d20031bad9c612f6ea2861dd34e5be9aa536bd5b16857f8a07c834e3bcd414872719ba6e7c6936dd077c98e273537b833df0f0d1f75fb153292c2c8d93d7bede97270f771917308d5cedb3423b7f4f38cc671fcfe429d71e08440ca5f3f81930d17ed7058da07ca3460a1b5877fe36b2a65627b305aa874fb59caa32aef136326076e22f7661c916d0215a6c6b6b140ed86a97ab7721f1eb189c42936336dfa1f0df027c67b668f2a0a3b4e213423caaa03eb17c943a912122013f16ca05cc2a99f9afc7b31c85c5694396d1b4a3c028ac09c44b8a4430c7b1ede6dcbb336abf6dfb3fc9dbd0ef24b01da4e278114cb81a928731"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0xc, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x11}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x1}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x8, 0x51, 0xfffffffffffffff0}, @ldst={0x1, 0x2, 0x1, 0x4, 0x8, 0x40, 0x8}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', r5, 0x10, r6, 0x8, &(0x7f0000000380)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) sendmsg$kcm(r4, &(0x7f0000000300)={&(0x7f0000000280)=@xdp={0x2c, 0x0, r5, 0xe}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000440)="78281bfd002ec067fe8c2c687ad0f2e30cbf3dec2c7f2d98016a2e6ca18c02fcf577b08169b9e8ffe08ad7b043c8a15d59cc98a6d8e5aac65cccc68a89010f13a8e13c373735be8d9d22566e81b2", 0x4e}, {&(0x7f00000004c0)="9ff55f227290da1eb8c760b50efe2f4c5d5e7793401878d53f02e74021d37c19625bda1b88a6597760a8d5cd3292bd62726ff46f8f229a74edfa6fb5eb4d4459e6185a797389c2625cf54bfd1eae42ea3352bdf4b647ea9516", 0x59}, {&(0x7f0000000080)="0e3e586f0993810f7c0e8f8da0b7cb338508736342", 0x15}, {&(0x7f0000000200)="441deb85349a1413f54178e49c3c34f41acb1c50a473cfd8b94f905e7a499cb31ea890d0eff639c8df3195b6", 0x2c}, {&(0x7f0000000540)="080d2d14572808ce45f014827505f0913054e4f212f44b26059e1e7c1ceec14ca2436de6fcc36f5de253504557640c9460e29787182f7411d914835b6a0c6dafec25acac19bb56680e556dfa3360", 0x4e}, {&(0x7f00000005c0)="750ae41cbd0cf90496498559a798a8821cdac060c8dce9321fede5dd6e6a8340d78848fc167191cc666867d65780abdb00d2d946a2caab5ba0ef1742531198354db44bd8", 0x44}], 0x6, &(0x7f00000006c0)=[{0xc8, 0x107, 0x9, "6067312ba655ebcae0e5bb6a59e5fe683d144c2125c210d0a9ec73bf9e2040ace438a4e66c6da784d3fad392e95da397f18c0066bac1d5e5274aec4761312bf45d5ccb167c5e3d1aacb59269a0b20023bc2d4b4e6bf8fa7371ffb631f68b9cb102e9ca1385f70d3e53d9e9ae4e4d65cf1c8b0a67bf38aa130000dc40e765b72eecfd00aa4eaf399fe1934865fbb5a6810eb2c415e4e5ba97c12cd8952350ecbb7a64702d957e4960a26e777cd506c2e78a48ecbdffdccd"}, {0x50, 0x118, 0x5, "1aa33d4c46842be5c2ad75a598d64283d84d8d3156ba2402faa41b5b96036e7089b32b83121dcf635ddf86d8ea65c3ffb3641e520d73fdfe49e3db"}, {0x48, 0x10f, 0x80000000, "345db4b536ca761c44fe89879a270827573a85b1c97b588e435ccd1482dbd00f00f54ad13731605824ba78a7cdad8e7a00ec5c2f6c"}], 0x160}, 0x4048050) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da802000010000c, 0x500001c) 00:49:46 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x40, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1ff00, 0x0, @perf_bp={&(0x7f00000006c0), 0x1}, 0x1041, 0x5, 0x80000000, 0x0, 0x3, 0x1c83, 0x400, 0x0, 0x1ff, 0x0, 0xb65}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) r3 = getpid() perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0xc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x821, 0xfffffffffffff191, 0x0, 0x9, 0x6, 0x0, 0xffff, 0x0, 0x1ff, 0x0, 0x1}, r3, 0x0, 0xffffffffffffffff, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, 0xffffffffffffffff, 0x0, 0x148, &(0x7f0000000780)='\\][^+\x00\xcb\x04\x17\xa7\x8dOG\x89lf\xd0P\xcb\x14\x108\xf7cuO\xe9V\xc7\x0fnm-\xbe[\x008\x87\r \xa6\x06E\'\xfc?\xfc\xd8\xebW \x93oV\xe0$\xac4\xcc\b\xae\xd3\x06?\x94S\x8a\x8c\xc7OY\xcar\x85\xbd1\xb6\xb8\r^\xc3\x93\xfd\'\a&l\x1a \xcb\b\xaf}\x99&\xf4\xba\xd4 4\x1a\x86\xa0\xaaL\n\r\xb6\xa1\xd6\xad\x9d\xc0\x15\xd0\x1cz\x12mFy\x04\xd8R\xe9X\xa0\xd1\xe9\xf6\xc0>\x06\xe1\xdc\xa1\\\xecq\xdb\xc9\xe3\xcc}B\xa8\xa6.\xdb\xbe\x9f\xa0\x1e\xc1\x11\xc8\b\x85\x16\xc4@\xea\b\x84\x80\xfc\x14\xe9\'-\xf90a\x1a5*}\xbd\xea\xa4`\f0\b\x84u\xdb\xc7:;\x93u\xf7\x96_\x8d\xcb\xbf\xd90\xea\xd6\xcd\xbd\fhgu\x04>\rJ\xe1\xeb\xb4\x94+>\r\xa6Gp\x83\x92\a\xa1\xd0\xf0\xcc9:\x85\x04\x0e2\x90m\xf0\xb6ka\xa2\x05>\x7f{n\x00\x00\x00\x00<\x86u`j\xfber\b\x82\x92\xb6\xc8\x1ak\x19W\xe90\xa6\xf0$\xe02\xd6\xc0\xe6\xbdk\x06S\xe9\x9d\x92z\xdb\b\x0f\xbdHl\x19\bx\x10\xd9\x93\xa2\xb5ca\xb0\x18\xbb\x8f`|go\xe0\xb0K\x04\xa8y\x1e\xc7\x82qt\xf9u\xc6\x94\xbaF\x80'}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1446.371666][ T37] audit: type=1804 audit(1632703786.420:611): pid=15530 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2327/memory.events" dev="sda1" ino=14630 res=1 errno=0 00:49:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000140)='cpu.stat\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_pid(r2, 0x0, 0x0) socketpair(0x0, 0x0, 0x28, &(0x7f00000000c0)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080)=r2, 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x0, 0x0) close(r0) openat$cgroup_ro(r1, &(0x7f0000000000)='freezer.self_freezing\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/10, 0xa}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000001a80)=ANY=[], 0xb0}, 0x121a2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) [ 1446.610687][ T37] audit: type=1804 audit(1632703786.630:612): pid=15535 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir370302997/syzkaller.ivPNpx/2478/memory.events" dev="sda1" ino=14611 res=1 errno=0 00:49:46 executing program 2: r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000002cc0)={&(0x7f0000002680)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x80, &(0x7f0000002940)=[{&(0x7f0000002700)}, {&(0x7f0000002740)="143e09b30446884399ff5502db3188b7", 0x10}, {&(0x7f0000002780)="96a3af980ebaba49e36902a9e30da4f00fb1d48f9267b2f20b2d1338254494cbfa23e886f555777da618f01be2e9896d535036854beb1ee5a8d0557a23b70f03020f6ca214574529f20feafd586fc0ca6298f00b382b2d554e8b4a77e1d9edbc6582f9c4dbbd74369ea0c13e1b223a5214193fd264822d2bd981012b58e0fba6e23703d582bc03ffb78db8427fc5a4c6ba48d146d0fe06968dce10dd8fbc1d55166b9d3450f66dd2cd89fac2f4f7ca249493bf1c9058acb097e837467907c89b81a0228fe19f017969a9ec7c6a4ff462fb230381966ee8c789188279fe8b5a71ae4cc209", 0xe4}, {&(0x7f0000002880)="8726a02bcb555d00eb1bb817753430b9609fad517f11f332ffbdd42b0d7873bc21a8f6048132ec7e28dba83cdcc82968397657230938a5e9d2a7131da0607242738bcb0114c04d6b129ddaa29b0c60bc90dd2ae01294ea71614d097ddfcc193d17b7947d1d8273984eb12da20bec904d715331ecc336e36ffa2bcd22b2613115cc146fcdf8c801de8e40006f8130b9600f16696e", 0x94}], 0x4, &(0x7f0000002980)=[{0x28, 0x103, 0x2, "16c6d73aaac9a243350eb59b9b6274f4035e"}, {0x58, 0x29, 0x5, "1f075995fbbca0d5527977d5e5c45ff23e5f5fb1e652b0cd26fc49c2786d78ccc1331b4533ae2d118225993d26c72df49393b51cc997e5495d4417101c1a8de81e7f4bd53c3f"}, {0x60, 0x0, 0x3, "e466164077381195c27a78896ff084c76d337d70928e0d69d1439537a2fb5379ab8eb6bb8cc0fe184a2cb63de5e54b9ea34b96813579c6a85840ce012defeafebd2be03e7c8908e73a5ef7b5b4"}, {0x98, 0x29, 0x8, "f026d2f325659491c178cb6f40f3e81c34c0db572ff260c5b1c6a7d930da56dacfd0dad37fac005cb41a132420f927a7f33d5ccdd9b1288765d6a836072806855077f7c1d4f063c52e9d5a57e8e36b40faf2bacda553a2b1caf2e18b6604ed5b3d826d3cb63a55ceee724c5da821453381ae3f36dc58de883bb0b296fd52a791ccef614f5d"}, {0x98, 0x118, 0xd1, "f27dcb7c752a9cafb097936da982d9650f010bd158ed615ee62515d9a44d1d6b62e4eacab81b2b82435139e4ca72fb068d8d9e0d1d2e0d151f19e41459c9d5867099df17d8c48a3518ac082064793d69683e8fb260e866e20d8b121f99b7f3c433b2b17c4df0f8872e51b207dfa8555d443b49136ecb88c7dde5743808b96196e459d1b1f9"}, {0x80, 0x84, 0x4, "4f213e0433d72e3d8dda2fe04f88fe601375baac7b93c9a0bc265c86afecfb3b6841a86e6ab354c493c5933813310919193be9590edd6e429148db720e7c6089c36d8a087ed2f6ad9e5a3f52df97f0b19121f16868845c072f2087187117ef3efc838cce76ddc760b9f4"}, {0xb0, 0x102, 0x1000, "bf687b4e8e0275bb9e6f844f95c0018a2ac53811248b96cb8e9587d763a370940e3380663fba119545226fe5d9bacf8f180d69e2a2021f377b402203d74f177a95facf483b5f17c386db57ac0ad605df05b91ec8cec8d2b84ac29bad7f4fabcdeed0856159614f5f755dba59e8003072803ddcee45922a3ff03e18d8bdc4b903f292f6fb5b5507c7152332da799174ac4d0a4d99ebef7ad83411b47cd8"}], 0x340}, 0x20000021) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x4ea00) openat$cgroup_ro(r2, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x57b8fc90d5dfdd55, &(0x7f0000000080)=[{&(0x7f0000002540)="02f000002200055bd25a80648c63940d3224fc60100010400a000a00053582c137153e000000000000000000d1bd1de656001456d8d39b5203cab6541ff3fde4470e1477d2abca6917e7696a26355cadb9f44ed64ac221eafa8075888915e87e131306c0f94fc2788ff5e9fe4ea27268154368c4ecf22c172766196aadafe19a26cb99d0beee7790eb6a6b9109e7dd09b0", 0x33fe0}]}, 0x4010) r3 = socket$kcm(0x2, 0x3, 0x3) sendmsg$sock(r3, &(0x7f0000000340)={&(0x7f00000000c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000180)=[@mark={{0x14}}], 0x18}, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000100)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast]}, 0x80, &(0x7f0000000180)=[{&(0x7f00000002c0)="3beab84d27aab6ac1283c3ee62a76b1c569291e0467ce6000a0a62e356c33e19555050d09df1a41bc160e0f621f880c3b5aa672d6e8819e1b833ebdb295d4150a81ab381d500d0517bab70e6c9f0b9eaa3bce7c3860912488457ec7ed51ae4336732a88066cd312a298edb66bc7b3e43fc2dacdbf1c2f234b5ae892f67c3471de068ee62bd331d9f8c05cea9f5a177942463898a91b514c4f9bbfe0a52f0f6d9cafa8d6c2a2f8ad11ba22813938fae269e27afcbeaa1fd69ea831ecc061c6676aded", 0xc2}, {&(0x7f00000003c0)="1c3d4c6e5c6b6b5d19801b227b4daa0995c2e2528e423b2069b91a11748eb2d3d29eeca17c7119a44f8076f0d0db49dfc91877c2bb1c3d1911c713f0778a601396f030d84f5e01c440cd", 0x4a}, {&(0x7f0000000440)="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", 0x1000}], 0x3, &(0x7f0000001440)=[{0x98, 0x11, 0x0, "9d489a07303f178448e58df8f32c1644ba9439920524a2d53cc5365eb17349f887f8085eaf091eb4c41d11f59fc57955372aaa327b821f97689a8b836731e37e9416359b25fd1ac1b4b881267fa619433534b0a3c457255ccebb2dbe7cf404b332aa528073a6799e672b64e67786ceba7642b73943c6bc6fea557f28fa3132fcaeb36a"}, {0x1010, 0x10b, 0x5, "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"}, {0x40, 0xff, 0x8, "2c66d215f0b986afe35f9c09da4f94b665026d7b1b70ceed3dd76a06336a650f78732408a65cf9228f54"}], 0x10e8}, 0x2044000) perf_event_open$cgroup(&(0x7f0000002600)={0x5, 0x80, 0x7f, 0x1, 0x0, 0x80, 0x0, 0x1, 0x4104, 0xd, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0xb1}, 0xabb4255d22cdb620, 0x2, 0xfffffff9, 0x4, 0x8000, 0x5, 0x3, 0x0, 0x464, 0x0, 0x5}, r2, 0x2, r0, 0x3) [ 1446.931497][ T37] audit: type=1804 audit(1632703786.660:614): pid=15542 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir370302997/syzkaller.ivPNpx/2478/memory.events" dev="sda1" ino=14611 res=1 errno=0 00:49:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x400000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) [ 1447.304544][ T37] audit: type=1804 audit(1632703786.660:613): pid=15530 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2327/memory.events" dev="sda1" ino=14630 res=1 errno=0 00:49:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], 0x0, 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) [ 1447.616777][ T37] audit: type=1804 audit(1632703786.970:615): pid=15546 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir700983676/syzkaller.L0WCwq/1295/memory.events" dev="sda1" ino=14635 res=1 errno=0 [ 1447.800761][ T37] audit: type=1804 audit(1632703787.320:616): pid=15550 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir700983676/syzkaller.L0WCwq/1295/memory.events" dev="sda1" ino=14635 res=1 errno=0 00:49:48 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x43a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x2, 0xfff, 0x0, 0x1}, 0x0, 0x5, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000200)={0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000300)=0x7) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x40, 0x7, 0x4, 0x80, 0x0, 0x0, 0x54000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x0, 0x9b}, 0x8, 0x8895, 0x6, 0x5, 0x3, 0x1, 0x6f54, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40305839, &(0x7f0000000000)) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x4ea00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da802000010000c, 0x500001c) r6 = openat$cgroup_ro(r4, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x80) 00:49:48 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3cc2, 0x22005, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0x8, 0xffffffffffffffff, 0x2) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000200)='./file0\x00', 0x0, 0x10}, 0x10) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000440)={&(0x7f0000000000)=@sco={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0x80, 0x0}, 0xc080) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='io.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0xf, &(0x7f0000000400), 0x8) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/cgroup\x00') sendmsg$inet(r3, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) socketpair(0xf, 0x4, 0x7f, &(0x7f0000000280)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000240)=r2, 0xffffffffffffffbe) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup=r2, 0xffffffffffffffff, 0x12, 0x1}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f00000002c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r2}) r4 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x890b, &(0x7f0000000000)) 00:49:48 executing program 0: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x304, &(0x7f0000000040)="b90103600040f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0xe, 0x7, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000050000000000000005000000181b0000", @ANYRES32=0x1, @ANYBLOB="00000000000000fe2e3f0085100000060000009d263000de0000009500000000"], &(0x7f00000009c0)='GPL\x00', 0x2, 0xad, &(0x7f0000000a00)=""/173, 0x41000, 0xc, '\x00', 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x2, 0x9}, 0x10, 0xffffffffffffffff, r0}, 0x78) socket$kcm(0x2b, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x13, 0x9, &(0x7f0000000bc0)=ANY=[@ANYBLOB="18000000125b3eae213100800000000800008100000018220000e1f3e0023dd55803abb55904d4d69dd305fda74727f8cb2003d7a6cb2235316d87512f7616f89734499883c1716a95d90486615cc66e0daeee912e7a20eb", @ANYRES32, @ANYBLOB="00000000020000f4ff84fd2ab67dee00000036000000850000003f000000950000"], &(0x7f0000000d80)='syzkaller\x00', 0x8, 0x0, 0x0, 0x40f00, 0x6, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000dc0)={0x5}, 0x8, 0x10, &(0x7f0000000e00)={0x0, 0x5, 0x6, 0x1}, 0x10}, 0x78) r1 = socket$kcm(0x10, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x10e, 0xc, &(0x7f0000000080), 0x4) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000280)='FROZEN\x00', 0x7) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="2500000016008568140f00006539d6000a0000068eb3d8152ec77948f352e237d4cd625de1", 0x25}], 0x1, 0x0, 0x0, 0xa00}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_ext={0x1c, 0x7, &(0x7f0000000700)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x32}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x1}, @jmp={0x5, 0x0, 0xa, 0x3, 0xb, 0xf4ea648ad83bfadb, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xddd1}], &(0x7f00000007c0)='syzkaller\x00', 0x100457, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000840)={0x0, 0x1, 0x8, 0xabb}, 0x10, 0xfbd2}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cpuacct.usage_user\x00', 0x100002, 0x0) r3 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r3, 0x84, 0xb, &(0x7f0000000000), 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000006c0)={r3}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000980)=r2, 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000300)={0x2, 0x0, @private=0xa010102}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000340)='U', 0x1}], 0x1}, 0x0) recvmsg$kcm(r3, &(0x7f0000015f80)={0x0, 0x0, &(0x7f0000015ec0)=[{&(0x7f0000014c80)=""/83, 0x53}], 0x1}, 0x123) sendmsg$inet(r3, &(0x7f0000000680)={&(0x7f00000002c0)={0x2, 0x4e24, @loopback}, 0x10, &(0x7f0000000f40)=[{&(0x7f00000005c0)="4bf6cce15963376f4033a519c9a0323623ddd9419437294d1db76139b2344671790885544fdd82fb8d8dc9c37eb17905cd4a6446153f19afac0cfe961beb351dd097da3a1c20ef366c382a43b7c36c7624d4ef4f364993b51d1aaf98ab4336ef52951444dce80ef07cc1ea1fa7f192b1d5168adc635bccc7e39c91193d52203fbcb1f244af92972333f14834beb28d779ae82d655d292ada674ae2", 0x9b}, {&(0x7f00000008c0)="fa2bbc14e2ed18c37b324d87d40dfccb0ceaef97d40873143d2dc836223bfef82541539e7abaa55c50000fa8f400af5ee54d6386f7765091da76420586e4beb0427164f351442a29f43d88b4a17ba700940731f96f915d411bc562040797f62ae0cb1abc4bcd7be8fca702b7b7a5c47b59df0278627b94156a2d62a294dd723c44a7d28a788c982bb7e5f79feb508c811474dcf9105ea8b4d9826462eef1da1feeb42c3fb032d17076707d720c5b9c414e6cd09de583776f", 0xb8}, {&(0x7f0000000380)="448fa55a351b2d830f9ef0d948979e9d5c4f2dbcff038025f4e03e20f7a99915bc712d505b0aeaa7c9d3856fea7e5d84a28c6514fc9a9ba6483e3d3afb39859990b331ac841e2d8a8efadef5", 0x4c}, {&(0x7f0000000c40)="e236c06d98715aba4939e3ccd1769130252d38aeed8eaa767c9ec3f449df988f76767e275f064b92784ec9311acfb87471ea752ef85fd8a0e764f9a2fad8095df72740b0b16464", 0x47}, {&(0x7f0000000cc0)="36d098131a652fddfcf6bfad3d0573cd4698c24c5bb6df59b94131d2b6c9d6dfff392e2deaf0d3aec7b9fe2b16a84111b235820838ccdba10c3f709a4829acd79f0c3a390708d3e57a612ffe79b0c9773b05f83cc3f374ce0b199e8c1f5a64775088ffc550a5afb953663810e025fb24699660f8af9cfb66c16f59e69f380ed52440095b8576c31092392b743a7d9d470976df639f62447173775b578d4d99a42c32daa0a67fd615aaf643ebd339e01741dd", 0xb2}, {&(0x7f0000000ec0)="1c1db9201e160afcfcbb7b60d9bf4eeebebce7f89b00687a1ed7b0bcf129428ee2d74f05ad2d8520ac7efe5078092ccbcaff7a698c2b413411e03cd5598f2c971be52a1b4ec0a0ca60ae0bc77bf54f313b4e13352a4b99e5e0def03a", 0x5c}], 0x6}, 0x44005) 00:49:48 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1448.412982][T15510] EXT4-fs: error -4 creating inode table initialization thread [ 1448.441426][T15510] EXT4-fs (sda1): re-mounted. Opts: (null). Quota mode: none. 00:49:48 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:49:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x500000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:49:48 executing program 2: socket$kcm(0x2, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000019c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0xb0, 0x8, 0x8, 0x1, 0x0, 0xffffffff00000001, 0x40040, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x80, 0x4b5a, 0x6a1, 0x6, 0xcd62, 0x10001, 0x7fff, 0x0, 0x3, 0x0, 0xffffffff}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r3 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0xa5, 0xf2, 0x5, 0x81, 0x0, 0x100000000, 0x81, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x80000000, 0x4}, 0x9000, 0xfffffffffffffffc, 0x101, 0x7, 0x2, 0x8, 0x7fff, 0x0, 0x37a0}, r0, 0x4, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000002c0)='@\x00') write$cgroup_type(r2, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080), 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) 00:49:49 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:49:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x600000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:49:49 executing program 0: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x304, &(0x7f0000000040)="b90103600040f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0xe, 0x7, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000050000000000000005000000181b0000", @ANYRES32=0x1, @ANYBLOB="00000000000000fe2e3f0085100000060000009d263000de0000009500000000"], &(0x7f00000009c0)='GPL\x00', 0x2, 0xad, &(0x7f0000000a00)=""/173, 0x41000, 0xc, '\x00', 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x2, 0x9}, 0x10, 0xffffffffffffffff, r0}, 0x78) socket$kcm(0x2b, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x13, 0x9, &(0x7f0000000bc0)=ANY=[@ANYBLOB="18000000125b3eae213100800000000800008100000018220000e1f3e0023dd55803abb55904d4d69dd305fda74727f8cb2003d7a6cb2235316d87512f7616f89734499883c1716a95d90486615cc66e0daeee912e7a20eb", @ANYRES32, @ANYBLOB="00000000020000f4ff84fd2ab67dee00000036000000850000003f000000950000"], &(0x7f0000000d80)='syzkaller\x00', 0x8, 0x0, 0x0, 0x40f00, 0x6, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000dc0)={0x5}, 0x8, 0x10, &(0x7f0000000e00)={0x0, 0x5, 0x6, 0x1}, 0x10}, 0x78) r1 = socket$kcm(0x10, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x10e, 0xc, &(0x7f0000000080), 0x4) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000280)='FROZEN\x00', 0x7) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="2500000016008568140f00006539d6000a0000068eb3d8152ec77948f352e237d4cd625de1", 0x25}], 0x1, 0x0, 0x0, 0xa00}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_ext={0x1c, 0x7, &(0x7f0000000700)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x32}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x1}, @jmp={0x5, 0x0, 0xa, 0x3, 0xb, 0xf4ea648ad83bfadb, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xddd1}], &(0x7f00000007c0)='syzkaller\x00', 0x100457, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000840)={0x0, 0x1, 0x8, 0xabb}, 0x10, 0xfbd2}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cpuacct.usage_user\x00', 0x100002, 0x0) r3 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r3, 0x84, 0xb, &(0x7f0000000000), 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000006c0)={r3}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000980)=r2, 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000300)={0x2, 0x0, @private=0xa010102}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000340)='U', 0x1}], 0x1}, 0x0) recvmsg$kcm(r3, &(0x7f0000015f80)={0x0, 0x0, &(0x7f0000015ec0)=[{&(0x7f0000014c80)=""/83, 0x53}], 0x1}, 0x123) sendmsg$inet(r3, &(0x7f0000000680)={&(0x7f00000002c0)={0x2, 0x4e24, @loopback}, 0x10, &(0x7f0000000f40)=[{&(0x7f00000005c0)="4bf6cce15963376f4033a519c9a0323623ddd9419437294d1db76139b2344671790885544fdd82fb8d8dc9c37eb17905cd4a6446153f19afac0cfe961beb351dd097da3a1c20ef366c382a43b7c36c7624d4ef4f364993b51d1aaf98ab4336ef52951444dce80ef07cc1ea1fa7f192b1d5168adc635bccc7e39c91193d52203fbcb1f244af92972333f14834beb28d779ae82d655d292ada674ae2", 0x9b}, {&(0x7f00000008c0)="fa2bbc14e2ed18c37b324d87d40dfccb0ceaef97d40873143d2dc836223bfef82541539e7abaa55c50000fa8f400af5ee54d6386f7765091da76420586e4beb0427164f351442a29f43d88b4a17ba700940731f96f915d411bc562040797f62ae0cb1abc4bcd7be8fca702b7b7a5c47b59df0278627b94156a2d62a294dd723c44a7d28a788c982bb7e5f79feb508c811474dcf9105ea8b4d9826462eef1da1feeb42c3fb032d17076707d720c5b9c414e6cd09de583776f", 0xb8}, {&(0x7f0000000380)="448fa55a351b2d830f9ef0d948979e9d5c4f2dbcff038025f4e03e20f7a99915bc712d505b0aeaa7c9d3856fea7e5d84a28c6514fc9a9ba6483e3d3afb39859990b331ac841e2d8a8efadef5", 0x4c}, {&(0x7f0000000c40)="e236c06d98715aba4939e3ccd1769130252d38aeed8eaa767c9ec3f449df988f76767e275f064b92784ec9311acfb87471ea752ef85fd8a0e764f9a2fad8095df72740b0b16464", 0x47}, {&(0x7f0000000cc0)="36d098131a652fddfcf6bfad3d0573cd4698c24c5bb6df59b94131d2b6c9d6dfff392e2deaf0d3aec7b9fe2b16a84111b235820838ccdba10c3f709a4829acd79f0c3a390708d3e57a612ffe79b0c9773b05f83cc3f374ce0b199e8c1f5a64775088ffc550a5afb953663810e025fb24699660f8af9cfb66c16f59e69f380ed52440095b8576c31092392b743a7d9d470976df639f62447173775b578d4d99a42c32daa0a67fd615aaf643ebd339e01741dd", 0xb2}, {&(0x7f0000000ec0)="1c1db9201e160afcfcbb7b60d9bf4eeebebce7f89b00687a1ed7b0bcf129428ee2d74f05ad2d8520ac7efe5078092ccbcaff7a698c2b413411e03cd5598f2c971be52a1b4ec0a0ca60ae0bc77bf54f313b4e13352a4b99e5e0def03a", 0x5c}], 0x6}, 0x44005) 00:49:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x7, 0x2, 0x1f, 0x3, 0x0, 0x7, 0x22000, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000200)}, 0x10000, 0x6bf, 0x5e, 0x6, 0x26, 0x0, 0x2, 0x0, 0x5, 0x0, 0x9}, 0x0, 0x5, 0xffffffffffffffff, 0x8) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000f80)={&(0x7f0000000b40)=@ipx={0x4, 0x0, 0x0, "adce635b307f"}, 0x80, 0x0}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="3800000000000000290000000400"], 0x38}, 0x8000) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009, 0x2}, 0x397, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280)}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x44) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0xa, 0x5, 0x0) 00:49:49 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:49:50 executing program 0: getpid() perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x608, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xdcc8, 0x2, 0x0, 0x40000, 0x0, 0x0, 0x4, 0x3ff, 0x8001, 0x4, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x3, 0x7, 0x1}, 0x0, 0x7, r0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r2 = gettid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x4ea00) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x0, 0x9, 0x3, 0x0, 0x0, 0x4, 0x0, 0x5, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x4, 0x0, 0x0, 0x100000000, 0x8, 0x2, 0x9, 0x0, 0x7fff}, r2, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x0, 0x4, 0x4, 0x2, 0x0, 0x7fffffff, 0x22102, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80, 0x0, 0x8, 0x0, 0xfffffeff, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4}, r2, 0xa, 0xffffffffffffffff, 0xb) sendmsg(r1, &(0x7f0000000ec0)={&(0x7f0000000280)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x2, 0x0, 0x2, 0x4, {0xa, 0x4e22, 0xfff, @mcast1, 0x7fffffff}}}, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000300)="fc1bbd78a711dca0284b19d2e5f181bb161e81f5d2ca93e8b28dfe9b56cb371d052af126c63dfdb106dcc7704d77bc3b4e755a329ff276969e41f22b354fc88052ed51ab", 0x44}, {&(0x7f0000000480)="7645f22e10bad19eddf25ab4f852a3f5655d4da253b83686ec462945706d3681b8b491d13908027f4e2dfa2b4ca4dbeb687bdb2c564a42007e85c4bf9b3bc55796d7a3355e4e47b184ff02992c51576630ef2a088ebee65573bcf7c962903841b3e19ac198fcbcbaa42bd411031b28fec807b163e01cc2d3efb9516f1468482e0920333d76f5766db62753", 0x8b}, {&(0x7f0000000540)="e10650a29d71cfc4f1658e8292c6417eefc051f57806b7757b32e54dffddd5569845b4fa1d436cc68ab42a4780e5d4023252de9f57c10991f9352c36026d8f9d28e13962d723798a41a7c396b940e873a58ce57076b1359c4860c2af77638471073599d5912cf7c2e9de31289b7bf1bc893222e5367a3124d7ad3324ca817647d8d7a36f6427ecabc28bfa5af690657b8781f6ef540e4f2c86de761d70b73c6cbcf4edbcf88303ffc8e7c252f1cbe70524ac66", 0xb3}, {&(0x7f0000000680)="f2defe119be1a49aa07de42d9018409c39036c9f2fc12e37e0f167e989efe70d3566f008d5b90101a9c3481c1edc5b01bfe2d623b024618eddac0be7679a7b420b0090a50eafd81ed3c37d939445c8bddc234b2280f6e1728954d4393ee80fd797ea7a5f53cf7a73c8ca6e68d0080bf02f6ddf90440da3a5913e11f3cdfb69f7c72da008bc25789ddb467aad75967e16e1782430b8ef8cfb32", 0x99}, {&(0x7f0000000740)="0c87ba5ed4335939019fd582ba8a1b9cee070b659b7fff0a824390a6aca8678821619856dad6d46fff5c6643d2c49b21486464b0e59adc1baa4fe1432888247800ee89360cdd2d7da218dceb63300f6f3383edef641b64a3e3a00f967d796a6dfac98469d17abc", 0x67}, {&(0x7f0000000100)="ad246ada7cba4ba77bd3ce42a77e6489334f7893085a73834650570aa24a928975268984e6cc46d6923bc66cecdd4fffff716ee04500d1", 0x37}, {&(0x7f00000007c0)="0ac2612451aa4fae32b898746342c6d28d4e010f2ad26f7359991b146a387b260b24d4cf21838f0dc4e1bb042968f09e967d40ed1c4b98dc04000c214a6bc9a4eceb2783bb181ea6c1b93cd9fa7f5e49138a018fc10d958c06237483cda8d3f40b57e5db580b0f22ae13ef3c0aaaf98922c698e7bb93651700a94b6c92660dc3db16b1e558812166fc45ed1b823ea4051d648afe", 0x94}, {&(0x7f0000000880)="3b4604177ac09f256d41dfd00852acbc71e151695ddbd71103c14e85f0145b59c45f09bdf4e0aa35238bad7b26535a04930884af04428cf67b2cba59ed2dd1b39ee0", 0x42}, {&(0x7f0000000900)="a08222acf7a6efdba32e0aa997506aabcad8aa33fc19969ca58919dba21005ddbc9be4e1674d4a63fbbfb63bde2bd432bdc933b194d3aa2477437537b35665fefd0bdbb9b18b609df1cf6d0ff13ec7ab2caad4b42978c4039050ba70fe2bca44f410762604868616a61e4c42a04c1d2bfea56c8986c20fd8a81da6fc53cca1a37476c26a4aa42f0f3f992c685084b609c99566b018577a66d1397d9877824d", 0x9f}], 0x9, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"/1082], 0x438}, 0x20004811) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/cgroup\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000000c0)='[%)\x14\\\'*\x00') [ 1449.934154][ T37] kauditd_printk_skb: 6 callbacks suppressed [ 1449.934171][ T37] audit: type=1804 audit(1632703789.990:623): pid=15614 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2330/memory.events" dev="sda1" ino=14671 res=1 errno=0 00:49:50 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x303, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2e00000013008104e00f80ecdbc0a4f211c804a01e000000302e4eeede63a3030e001a000a000200aacc2b2043b2", 0x2e}], 0x1, 0x0, 0x0, 0xf000}, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0xf}, 0x14) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r1 = perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000008c0)={&(0x7f0000000200)=@isdn={0x22, 0x0, 0x0, 0x81}, 0x80, 0x0, 0x0, &(0x7f0000000680)=[{0x20, 0x0, 0x0, "cd4467454e047c8adef85abab6ea58"}], 0x20}, 0x0) r2 = socket$kcm(0x2, 0x3, 0x3) sendmsg$sock(r2, &(0x7f0000000340)={&(0x7f00000000c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000180)=[@mark={{0x14}}], 0x18}, 0x0) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000280)=@pptp={0x18, 0x2, {0x2, @loopback}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000300)="ef9974af2d8522ce849cbc24706043a813202bfe53d16a159984ab9f8a8e6c37559d305251682d975a387f802a22a1edd1ddb649f63a2375585d620e2a2635d913d352e1a6206ee39bf103d0cb380eb7dac240c2adf61677c7c817bc692822cc5ca1fc6ee9271c4a039a9aeb65ded524d4355047b1912b444748b53a6e6daf4f8a45ee41ac33d777c35506050670a96d13bb291996c7d327a4e2c551e2bda1649855dffebe3f08b6841d0761479bb7771da2b55f6d1474c5c5dd71db57ebc9cf3aa1e765c5d1d69e02539ee4f3eda30ef18ef196ec841e0498d88e", 0xdb}, {&(0x7f0000000400)="0ff6abc6461207f8fbd99d7394ff6f64d23d83e0505d256f16d24b137cf92cbf0c97e71fbb03159d9285db578e83b7a38ba1fbd83e275d7755ac3259b98656c1e0a7fe65faa2e8d172a4342076bf7a1ed6d7d333140369ef6dde271c56ae5ac2b399660dbeda18853e2f88725f25050077618b8f5fc27654362e77ca04939ea1efba891bbb3dc832efd2a9787d7d8aba6bb035d87a141476a623a2d9a35db9e55672604a21ddbc92e711c1a4b85deb0acc431110439c01", 0xb7}, {&(0x7f00000004c0)="9249db9bb56544a17e08d23dce3b1c3f35b4ebcd3c2a19d1fccf4e6c89f1952d05b7ba148edb44911e2e700bd65da6b1303a4ebc37aa8fb41f6e8ba393d3e673fe21e3d488532de20d1a79c863de7683e92c56fe598c2447bbed967c1a46f9710f7a6d41a971854106936e1d0a4914d224d57ab4", 0x74}], 0x3, &(0x7f0000000900)=[{0x1010, 0x0, 0x8, "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"}, {0x68, 0x10e, 0xfffffffc, "128925239cf32e23c5252026bdaad21740619915b9b846a0e45073f14e22068a8f4dc627e65199de27bdfce5312654670028fb467ceb3bff2398d29743c2c16f0c44298e404b89d3706a02f72cc305897ef6"}, {0x88, 0x1, 0xfffffffb, "a98fa68025910b0671a5c0bc212fcd9e8a22e3b0fbccc4af4f561eb246d56dc7f81c1f9c04a324d267371f132771a5851c94998594ad9e57b2ee98946296a6bdfb6063d1cf88c3a483f6f2a4dceace78a615614e54cccb31c471509318ca7616e4423841e3d14f544428dc301cab4bba5c0ab7"}, {0xb8, 0x0, 0x7, "cc001767bd86ebfd0d9979f77349eda64e24a7038d9bbdb6796cf31502473a9ea751804cce6b88fe34ea1b1f7fc1fa16014a06bed65a47db6467bd5ece3a03d8ab139ab5aab8809c111279e4524579e2d4ee4710d693870b75da8d9f41cb1e261150830442939fa00a741a6ee874309a904ccb431d45ae6848e3e01375aef113647754bfba78984060b89dddbebe1f705bf6f97acdbe083c69fdfc472c74e450870b7034361c83"}], 0x11b8}, 0x4000014) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1f, 0x9, 0x0, 0x0, 0x5, 0xb2e, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, r1, 0x1) 00:49:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x700000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:49:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1450.275297][ T37] audit: type=1804 audit(1632703790.190:624): pid=15614 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2330/memory.events" dev="sda1" ino=14671 res=1 errno=0 [ 1450.328266][T15624] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1450.333475][T15622] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1450.436342][T15622] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1450.476386][T15624] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.5'. 00:49:50 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:49:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x4, 0x4, 0x7fff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x40) r0 = getpid() perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0xc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x821, 0xfffffffffffff191, 0x0, 0x9, 0x6, 0x0, 0xffff, 0x0, 0x1ff, 0x0, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x1, 0x6, 0x3, 0x6, 0x0, 0x3, 0xc0b, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x85, 0x3, @perf_config_ext={0x1, 0xeae6}, 0x400, 0xa131, 0x64, 0x4, 0x20, 0x34e, 0x800, 0x0, 0x0, 0x0, 0x7}, r0, 0x1, 0xffffffffffffffff, 0x8) 00:49:50 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x2, 0x3, 0x3) sendmsg$sock(r1, &(0x7f0000000340)={&(0x7f00000000c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000180)=[@mark={{0x14}}], 0x18}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, 0x0, &(0x7f0000000480)={0x5, 0x5}, 0x0, 0x0, &(0x7f00000004c0)={0x2, 0xf, 0x7, 0x2}, &(0x7f0000000500)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=0xccde}}, 0x10) recvmsg$unix(r2, &(0x7f00000008c0)={&(0x7f0000000680)=@abs, 0x6e, &(0x7f0000000800)=[{&(0x7f0000000700)=""/199, 0xc7}], 0x1, &(0x7f0000000840)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x78}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x17, 0x5, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffa}, [@exit, @func={0x85, 0x0, 0x1, 0x0, 0x4}]}, &(0x7f0000000380)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41000, 0x26, '\x00', 0x0, 0xa, r2, 0x8, &(0x7f00000003c0)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0x3, 0x8, 0x6}, 0x10, r3, r5}, 0x78) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x4ea00) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000000)=r2, 0x4) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{0x0}, {&(0x7f0000000240)="02631b5edcfa1315087ba17c524b73347fd4591a1985564f17a56f7026999d95b686eb80f110b5986da1604aed1249f23b32660e82845d3594d59d5109c79683b3a97932f83993479fea5098838512cc87e55ed559fcf7f81a81aa5a06671311651fc89a924d08b9878abe57b5b55a56bdfb4110af336674221d8630df5fda00ceca1048e7e14be959cd28ce52cd034a728156f98b6e646e56ef979e8adc74", 0x9f}, {&(0x7f0000000100)="62e1e7dc1ea16fcf1d10f31cfd409184685ebe5572eb6adbef8080884479282e6738b349c7c7b1089b9ecbf0066304a50fb84f83b4f560fee45da36925f78da85f1f4faba342cb79", 0x48}], 0x3}, 0x0) sendmsg$unix(r4, &(0x7f0000001000)={&(0x7f0000000980)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000f40)=[{&(0x7f0000000a00)="9e5d3b5427fdb4c24b9f458acc9c74fd40e3ab6b53a5dfcc5ff9a9db64c6a41269f5989a75b15d766a5926628bd22157b31d96786d3fb28bceab2e392c5b4af41e96d4733f1e93a96236f20e35f150aa36c5a44d9565bc5d1775d8b6d41b8215980aff9afa5c331ecd716f4e11f9451cd150447ca9ed62c8f072a6b0fe91208b0fc0611da5d48122b3631830035fb324", 0x90}, {&(0x7f0000000ac0)="abd446f4af208fd85b8de982fba6304df8981c93119349d7193dd6381b0ba247097a755e5b26c7b7a1e0440aae190c4a6c4effabf839801d1f7721099ad646328f41d15da1c2bdbeebc4ead7e6c1f951ded756a089cc6a64e4b211486c28941114938b1a32a9eeba1b36", 0x6a}, {&(0x7f0000000b40)="4a3ced807a12d8489b42e272b52e08453581515e4be294a2a52cc270a393b242b77c950a82a6c9e540f04b36576a84bc367a1b616c4ed19a0c055b", 0x3b}, {&(0x7f0000000b80)="6faf589800c69ed5233038ad8d2277c488e8435dae8a2f19a12c88bc88a44a55794fffd8b32a84290546062d7e424889e9c5fe5068f462e2a84dab75c286c165d93464b277dabc", 0x47}, {&(0x7f0000000c00)="5dc2928e8f81cbcb64b0aa8cc6ee0efd052826881978ec3360e6b45163f64f3a3b72c40d0656b890c00a2fe7901e84b81e9e8474dbae964f2359bbb69ae92990f6eafca42b17b46e0e0ff308b8e2339d8fe8340c9f9112e17b34c9ec8755d7631ab3f45a4c151711b829243d4b958824703b0e0b94300b6e6e52350b6fff7a165860e0496426fadbe83b8819475bb903b9e59e02433c42d7992795cffffa9439f43f6d6180f332bfe1308407a445ad3fe7be5e964c59fd2cb2170371d1ccc875291c1649d5e31e4c07f792b7", 0xcc}, {&(0x7f0000000d00)="45e933d61b65525426467fb1d688e3dcedcccd475541bf52ba32aa4307d063f6643fb009e309ec9c52ba96eadda6c05813a7d2d84d59e3bd8d52fa2be51a6e7df1788bfbbfead975e9623923eaab5a977133f7375b796a2223f8043449b71f5466af13299929896b519bc0a52943c43d522a8eec956d21cb679f67d665a4fdb119029d9bfa354ca2c32f702c99dc3a05e701a7", 0x93}, {&(0x7f0000000dc0)="53b589b6e6e09e327c04f8f3f20f8244cf10be410522bc59dea71b6d47544be1cc4c1611b65baf80ce5ba0dd0f01c08e6ed414e833a8d618f253f384d60516244cd7181dccb6d7a15c9c57f6b32a314c57daf4b8320e5c5e45cf79a94ba211a794c626c0c32b97fdecff7163", 0x6c}, {&(0x7f0000000e40)="22cb1f6989f4770ccaa0b62e88cca68b496e988aa897defdb91c8681198e3eebe8f3010a37c8b4c6ad994937558be6604d8da9d2cdd6f7572c785b651902d3e794c992152552c1c9ba3d9fb69e", 0x4d}, {&(0x7f0000000ec0)="8372c2b94710c353044d871f2ebc9c81b1f3b921fbac2eb973bc665a942d567123124e69a104b4080cec11e8c7ec14aefb47552f1a16429357c7c90edb952b2a7b01170774dafcf387eb370a0f273031b0598615706a37439581b63f6bb8ff16d8fc60d1c970ecb2dbde97c6b9f1bc2ffa78", 0x72}], 0x9}, 0x40000) r6 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r6, &(0x7f0000000180)={&(0x7f00000001c0)=@nl=@unspec={0x0, 0x3a00, 0x3ee6, 0x3ebaffff}, 0x80, &(0x7f0000001300)=[{&(0x7f0000000080)="3eba0000", 0x4}], 0x1}, 0x0) [ 1451.048318][ T37] audit: type=1804 audit(1632703791.100:625): pid=15641 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2331/memory.events" dev="sda1" ino=14676 res=1 errno=0 00:49:51 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:49:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x800000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) [ 1451.180769][T15623] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1451.219634][T15623] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. 00:49:51 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) [ 1451.277323][ T37] audit: type=1804 audit(1632703791.170:626): pid=15641 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2331/memory.events" dev="sda1" ino=14676 res=1 errno=0 00:49:51 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030033000511d25a80648c63940d0124fc6009100640050002000200001937153e37000000010a000000d1bd", 0x33fe0}], 0x1}, 0x0) r1 = socket$kcm(0x2, 0x3, 0x3) sendmsg$sock(r1, &(0x7f0000000340)={&(0x7f00000000c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000180)=[@mark={{0x14}}], 0x18}, 0x0) r2 = socket$kcm(0x2, 0x3, 0x3) sendmsg$sock(r2, &(0x7f0000000340)={&(0x7f00000000c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000180)=[@mark={{0x14}}], 0x18}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0xc, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x11}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x1}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x8, 0x51, 0xfffffffffffffff0}, @ldst={0x1, 0x2, 0x1, 0x4, 0x8, 0x40, 0x8}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', r3, 0x10, r4, 0x8, &(0x7f0000000380)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) sendmsg$kcm(r2, &(0x7f00000008c0)={&(0x7f00000007c0)=@xdp={0x2c, 0xa, r3, 0x18}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)="77a09f8d146fe65b8b3f77323c98c48f5f0941", 0x13}, {&(0x7f0000000d40)="60a4bc909dd30eba3d9d30a866d1def18999e17c1e0de02843b249ec52ac7f7b9aa05d029feef1950b9cad9f289d7c77e28c394ddc9e314d7c79e4db07939e977bbe69704f29a1532d675ac65941f70fa398edcb2445b493a0484509daa73b7a50a9d39cb829d19573e487a97afd4da0275baebddddf0c707a7ad1b138fcbc8072685da10b172824abee58262233b7699e5c0e7773a81614547fdcbe767e8732e031781948f02ec390f47c3d20d0c631e53355eb31af5fd9ecee5428d2f03c8a127a618f82ddab8eb5f9e7abe168618cfa1be1009288c4bb1f143faa30e8964545c678a3972abb8b7884a6", 0xeb}], 0x2, &(0x7f0000006380)=[{0xc8, 0x1, 0x2, "0c371b08a5b738a6e084ebdfc069fe1d2482774cf7931a6881f21e555faf802420aa2b5317fb31ecb5b95b40b201f5a9f76b5fe3e9148e724c1c3418c60483a1628142f8a88ba9644923a27fd150d116ade5ad4d9f1b2608617e694bd24878610a5aaa9a7158983260b9e3a2d8edd29a1060d743cda8bff2a2a94271fa3a6026eebb981608c0de4c6b6f268d2b28295c448224849f476c2c2211b3abb43dc21fbcb04e38eab2dc180d7ab00b309e53e54de3270707"}, {0x1010, 0x107, 0xfc84, "50ffe37a7fb3c2a319096c3088c78d23c3a77ac03d2ac2d9eae4f5e114ff8bf56ed321d87111cbdb5f913944918cfe55186f08a8d5da57a44745dccc893dd13971602dd6789ca90fad87e6c9d46e5c5b9dedc26146d3b6235321886efb66554562a06155319ecb256e2ffba80df81f3b114308f6ee0756cd90da570b74064f406320b3a61f0ec4b4da22e186bcfa90c0d5621ab10de896a50deeeea8c10787ad1d0e071fe003b6ff3b02106c4f4a22cc413601b0b916154c594c29ef4d245a9200ace15febd06cc29b5bc1b48437c1d9a4bc022c5d75a5d6285e2c173ddfe7ea8b8202d45590ef871676a879e2c17fb1fa45d451e532f42d93ec01af4275532f1b23f1ff7dd9fe4262e81878b7fafa3ffe0dddc387f02d3d75ca4169ed093af68064b292e861d5b132110729997d9ee703e646caee86654bb81d08b8cbc46c2fcd31b8f9d7996b4b208566ad93bb22058e5c92dd3551889863d559d7065e80d6bd2d70a00cd489b00bfe03f1d0876070276333e91aedbddf64195fe33e533de5b4b4da33b27980db731da53e04bfb4db8203b98b54d51afcd0e2c798bf63db15acb42283b02b0d181d59e681c22a887acb736db6a00424612a8f1a0c9d3bffdc2782e802a5620d80ac3d353e7dbf7077c61973e6e38c32ee0494034c5ee981e47b238e53fe73238b8376fd483e46406554d7544b4db79b4931b1e70112142139949d1ec2247f425405d7b9aa6f3517fc728c1e2c60a3c7b9db78f1d856036569658c3906ece334af61f96989d5192b4caa2b19ef54081d85006afcb905b18b18980f17e41ed4d34972bf2402ba510cf469a3ddfc843573aae99beec080760b730472d71290f8f5a2a1d006e29e9482437e38edadcacfad749401e017f15c7ccf43493ba4fbe5c81c719e5df16f3ca85555bd5daf0d091ec7204fea2f7cd6f9263cb0d93127fde4c783b6ac9b061bbf78026f156957664e603aa5c8e1e7176feb1a2cc89f556c2a929026372804bc77101f2f79d709fb2f9e5a0349aa44cdffd49779bf92f4a8410d10e61ac047eeaa564796d59c3b94193079721ebf4fc5f35e745bf7354e04b6d64c421d374b35e0636f954dd7d839cc9ca12ec606cfc9c818a954ec09fccc6663149c2c751018dc0a2668b8977c92b95c0e8d11a768bd04b7ceac006e80438f34fca8e4de7a8562855e6d61fc1712016635746e67780d8127175ba35bd58277d6930113a5ba7ab60a81e2355e02be356a6ce339f4ebd98a02a830cad60ea081e0859c2a79958f4480b589132a2a6030803a795728b5dc6c76870db7344878553e4c87fd7dea9fdb8782cf8e0e83b095489ddd8db2fa87f27da67310223de1165a5f3d9798684888974e4e16e38c134b8fabf009757c42a22cc5f9622b5189d6a2bb00424e69f9a982d7500513680ea411f0d87fda232204560b6a1985c749ac36895ff4e0e9d73fbfd1e21298397265e165674fba734b1108e55897f239e6ba78dad76d44c640418f311c3acf962fbb6bf817e98a5f91fc582db5bbb60a9f1d3dd20bd650eda823588f23f84e251b8dc1e5e4aaf7f29cbef7227c2f857c5966063def1edd9c8f0af4b3368703ff9d3c534e84d96aa920e41c96bae82142366e9763d66c0f0d1725352ec1201ede2c26814b8156302b20a8dc8fcc6e31fefea9a3405e7c117ac1d0d61965093c69bc233ed93b477df4f612e0fa5ae11f0778523718a3c02c477dcb70b59420daf2eb55ab5b3f5588f5e517cbe089f211c85530bd2e09e279b22598f8e922a970356f51f7f2a62fbe24621fe533b1822d114dd628c89c7486f5e39b07c521d371ec16aae6dc5140dcf859c35aec9a8168046405f6079c8f5377eb5c30385f2fa0ee6884157c2381b112c514d808f0af2f77d83ccb5213d8317909e844ee0251f74b24cf96aff1cb2516e10797b487594652dcf1d903031bf52cd3ff2d8c6f5408be48f6083504f6eda764a8b4489f3f83d0650050ef7bfae982862b0a854f5164b4fc937c25757dd4cc12cff4e12e30a1626e6122292f5fd1b58ea50749f0c985430064df17afc5f41ffbe9e831bdc0dfbfe192b63fece002f7ab0193c32fb8e4dd3ce2bf1a5298ab06d27f73a17f6a2f7b73cbda4885b9eb183965cd55f4b31d72f9d56a36853197561e9b1f06a057f1e98aae9d7ef0241a5d00eaa1b4c1bf05dea7957306564f6f0de760427ad54410520270092473eaa92480f111a9027d0e7b50f4b1e611120b961a17212a9b8a812ac40b4015be71ebaabb47ec290e04183d1cea2ca3d1edfb537d5ff3ae08881841f85a58f6a4d1b4fd56a0d879c71f93b9b7bd574052be8f413ddbe58623628dee78c1d0dfa249bc2de8f3d9d1836fd6b28bd1f968d9055a7b7fdf58bf41065c04d1396688fbc66a7df06b5e18d97c56bcef2f4606d426526d7385c883797545dfaa06a2cf368d61842aef9c1eb8c1c07cfb34e13b19578a23dbc7984dab51fb1b4bd346958761a6c32b07ad35c29e495ca1f4165c9eb6e40cc015f49ac325b21c1c9c16c8b397ab5927f4b5850fdcc0ae0dc887d8c66d19106fe1e4fb96e1c77d31deae17c68396ecd95815d69ab036fca7aecb497afcdf8f3c4cd19a9c144663ac0d22bac88bc4302e120044d30bbff07bbcfee6447d964ec9a17b9dab3c15651444b2c91858e2dfef8525158179742eebdf36aa3780ca0ec0b18c72fb3024f7bfadc5f4d0a6357b9d6e1444b5c450f6728d3df461545c8242c1fcc980b2e7afee57230c400a7f6363c3cd5b10385180d368e9575320dc4b84881fe67120ce32aec8324a22ca53256da11138d781348ed6b33ca7c52434c62cde383c5e3b92257d4b245c3603d9104ee64ce79f1005f7aec7f8bb135b2eb89220e8dc666300b7bdc41e46bc6f6b72b2c75fe4644969b281fcb4c58ea7b7a7420f257246ef9ba240c30774b9c965c41203a414b47abe035ff1f901af7289686b4df99541c92caac782f65102651518f409a1c54eb98740391644a7ec60e1e3cc4e18a19bc5f54a9e193aee0b5fda97386b553d5db01bbdfb874a08188766ca3f32fffb5992cb779ef503aa94e1a44bffd15a8ff009ac74eb7094d606dc3c4f92be98afcf37ee1501b3a3fb664dfe18ca2eea0bce98f003991bfbf5f93c5efdc35771d6e4297a4adb2c5e8d29081e32ec5c02e70604da86f006098508b20b90015327349a6570ad4fa693dff082521db905afbbac35ed1df776b4fd62907e58efa7a68deefc14d631154ff3817ed91e23f138c259bc1fefe704cbf36d0edcdef77a4bd85aa92914b923cbea52ef2ce197df2ede33066b96d622ff21cb43ec418baa515065af950ad7a58780625535b5701982bb338a25ce9fdede9407e671d52ee9a465eb01d6a4dd4fdff83e97ba09d881d4287d5c73021226f2015b24704a781d66ec1e242d4c9baa9f118caf733f2255089aab908e73256a3e7ea77370e098d16cf6a4376d58820d2b5d62cb0d6b6193036cba8f276ad10099e879fc9bc8b945cc9547e4fe04474be4134ddc1b4e82e86cf34f5858652911d6960df416dfe479cffd172afc9934b5fada2b3e2da8ff1597ddf9eb5be33b8c9bf4334c0494dfb6cf306d93e4dc751a83f408e1f3e21cbd03b7c6407ce83e1b6da3145eca5da743d7a9e327eeceb8194eeebdc0344a8009b2235a8e38ffc7f6cb910e87b658c0cf1c8d19c52ce9e2fa7e3524a5543b27d892f0616ba744d2cf619adc910ec8d558f6e81e3342e392be259a037359239c8dce08af55b357a091156d9ff53ffc19fef31a1719ffb4c61a9baccac0e8824d1d311b66dc278d3e94ab4f841518df8c1beb4a64d83a56f51bbb40e3bc8b64ea3997bbb02c77a66ec7b517bd44afd9ba7a349f31b0d9c6840ceea4475393d4330f82294662a1f98c9254fd9ab3a75b8082e3c6861bcff65a2cbc6a77b23f16b03e09c007c39fe70ac88c01b6688dc06798c56714e8005d96de8801413264cec3c9c19dc95d967ef7700f7c3067deb63a8e93e7e0408a58149da996ab3391b6baa92adeaebdaedfd4c29f56a0c851359da73d4d88ca3b87a65bd5bb1360a5705e708bc8c207e3236096f8e0c5a2fe44e2ce6681ed7642d95a22c3e218b5b031ba0d1b4fa43e2329e75eb193a9e052509de86628b2d86a6c7b6b7c675dccd7d7dc47dc272183b0d5d6c53b67f0b701742c9f6e97cbfce7fe32c5150da4b9ca88f90fd71ed589a6da35d4b0c3275592b94e8e9f83bc86d054f64dbff3af774d875a8ea2b2fba5b2ebed760d4ac9b79e0cf19afba14e74af3ca42ca3e0ac0df3c9b1891c8f56158ef46199aa63dde793d7e81d34aef7751b22f53525eecdc3d4ef536a0480f73c52d15d2fc601fdddfa1e148f5f0982c762dec9db835d594cb6619fa681e33f39a6b369ea33b78ac21275308aa74208aa56e294cf9ccb95cd70504b35843738e4ad7714414f090818f584262ea1f85ca7e3583de38b01c2b9851a01e6852cc16a5e80f4c7c5d840e213577592b7fe77930cdb43354c6e53dd2bd259500bc1b7ead7326246fc8bef132497a6f9d4f5ec4e6d93d055fb5f0c44f2294cbf8fcf027240b9ce935ff19eb3829fe1eff8f552176d39985b6fb43680782f471c964ed870dd71e60bba5fe9ee7466854da9b9ccfb5978068922d70ab139ec2a23b5617e7501edd14f7b28f6c5ec80e59cd38067916c84101cd98e20684c7d1180d9e5da6e1b8ae9aa4ce3337c9c8e6a88093530d002d6de4bd40e5591b12d2d97b9a66c23c1ef701ed81e1100a736e3826c08ff0f2f01e02654ab69cad9c3b3394aaf05a89260ab21d05233228dd7e8119d981f384143559d42913b6de7b84ee7cb6a56f225dbc94d60bc69a170bfa895cd666d4cc2731e9e5e700bd299cd00a07066bc2572e19de28cec37a513c879979d948bf3717e8d380210ec9483830831c197fdd071cd2ac936c1020a88d5f8b3407d46444b9adb917678a74ee43cadfd3e9d347541549749ee189488d01617ae44492743dd59dc6272172bc0c551ae6174ca3d7cd0303e41f0128f0c26668b98ba805d657434b3e65d20e1c04de58fbcbba90a0d6ba158c0e000e3b2229b0cb103966babc311d7a89efb5b8003f61d0c3b05dae3bcf04deb959dc5f49ea3c72838071a1b60651b14ff852c04ca59c0ff12c31d8e03919a8b8a3193fda2c2e1e8e7412421ca8896d1109d160812e142ed9194d4720a9e731c9f406e358bfb48adf14e32b9d1efb74daaba081f020f662a790d9f13ff2b5d5155e8331d47c958a8e27810130807b039ad21baa8f65ffefeced578396a86bfdc410b28e119aab1a92a1d3fe129afb1b5cbf87a87248abb7ddf01e7a5c54062a169b75bbaa65ace65fcb5304150848ae3b842f5c05b2a67236ffc33ff753f9fd9ed622b50576c4a83576118aa0fa18539a0fd57813673251b68bdf39e1e43c813d8fbd364602fd587b20dc0774603fdc77416805ce16ab7a300dc06491ca91c920887eacfe78944c6c60700345bc37970c3a04fffe0c8c77d89b67d1b0932b5963cf54a1984aff5947f79548a1214ae741aaa9ae07ab342bacdc2b03facb333e2b5431ab2977c694b22c165d749e8ea482af5d22063b99301535d71f4a8420e906cbbbab055e591d332781ccf15e052b2fcbfb30ce0fa03a257e821a373b328818ce144477fdf709b97ee0eba7dc023026e7d780f9967927d13811064bcf3fd1271349aea47cd1f89e44c4da918e3dec0117589f488a6fa3ecbb8dba322ee6717cfefe70989d4c204b7"}], 0x10d8}, 0x8001) sendmsg(r0, &(0x7f0000000780)={&(0x7f00000004c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha1\x00'}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000540)="d9020d899f0a43eee32603f5049e11d8424c84ed395ccc9958efb266679f626917615cf53bb435dafbc4fd18f56db60d4e784452db87c363285eee85ad69ba5a865341d1c47f37237afb73ac90aea7b30e0ed0f95937620ad74d0625b8f7ed2be083feefbe43262d970392b5ac3d194bd2648edd4a978c420863112d2356c49250e54a2f5fbaf8dfba4622eded58e8b5d83af6", 0x93}, {&(0x7f0000005380)="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", 0x1000}, {&(0x7f0000000600)="a36ed77da1527a77661d4d8004d817a12042429fa253", 0x16}, {&(0x7f0000000640)="dab63c1504d807c52257e2df3a3e155b5ffac356c31cc63c30ece740a66e6fa3907da6be0d8dce2e1c627dec09381eeb73bcc18e027bdfffcca7a96dec30411e718ab750ee093918e5306852a80b45d2e72af7f48f56b22ece96b6078ff2886c1ff5430de1ba343ef05f63e0ca084ab160b5b7c99cba3fd6647df9ea20b740483b78ae7790548e82538b20f70bf1ae4158981b73bed756033f2061de9fba92c9448e3c6a727e99cbe9c021887b41753eef231f646b27c70e091bb20fba1d870daab59e4014efa3438f1e7047b690111b00ada1bcfb", 0xd5}], 0x4, &(0x7f0000001d40)=[{0xd0, 0x10c, 0x3, "2fd77113745a278aacb1ae3752c54fbb5f178115c1c988cb272d7cd701f5429f8ea1f300307f40bdbe9bf6a426ad6a30fd5bf668ac44454cfa840cc137729685a40242b94aee7849c6db6dd1540bb0b14544bdfd766648b661e310c8e7c153c85cf8d15cbbb00578861ec05f41fcdd5c77631c6e11e4f84afff9b95b3abeadaaa8a08ee609d4c2da26920aeb108667413166cc4737c34ccb23c9948159d089f915d4ddcc2c52480f28967ad8b7b3524c2a281d848bfe8fafe4f28e8622c4"}, {0x1010, 0x84, 0x36ae, "3f8f9a3bf0b382d088d0e3e260127c4bc37ba67e74b4fc989a3e551e21ddbbec0b1d6ebe2f4fa9c3947d43c79bf23e0ec50e0ed8cb77c3a96e96cb5931ec6472fd13505ab2efc51b10d8d0025a6d4f21435ba316c74f889668f7021858509a20a979ea24f05dbc46936f70cbb4087e7b4760122bbb983f6d54f5d8b635472dbca52ea9ba0351f07d3525b54f9a67fe9eed3a5de2f597d4d4a0e53ec657b45d872f040ed4cd340f727cfdf2a41bd993b3341bb21a727c3c2433343bda2a3938cfb69ab970006cbc542239c0aa1bcc017a8fa1030d003ef39b755426c9b82c02b36dcc8d4a871850bcccf9faf17d15c7bcf6283d099c1832569c712ff8018dfdd45909efc67b21cd2f6866c4eeb3ee8658a95f85de48d26db70f783046c22b1bc6fd24315d48116e3b6fffbb4e094295fb3546951c36bfa43846e70863bea6e3ec4f1ea62a4c8a4e19adadb62d38d0a7f73c42a28cc5256e5ee6fa99f28ad6afc55f327ec37a32764fa57213b428126d212d532f8865044d5f89228de1136b998f97470db4e8b640ddf53a8f8bd2d3ecf1e511edd891746464d85db06200499e50643df5bcfa77ad969e28b065f3d38b5f7c72a39c75c03440f1bdbbb03f117eb9619f4cb07568e4e8687981365f36fa6f414d1f5d73432607439b838685899d55853f524952bd3c6a01bd0a87adc8f5e974c095e94258740b6cd171800f3e7408b8d484b56db987443b94bc2ef1bbe8389206b498660907d7032b41ea81bed996de10a0b6451419a57b5c43531057ac7497871d463126dd9a8eb70ee4e4841b4caf8793c04553432f36d596ed554d2d05b11ea538a1c8c4e647e55a15c1080de687d67d923f48f6f62fc9dcf9050722724106b1f37777cb118efa903492e3ff783f9c115ed80ec8e1ddcce929d3517a5e9ea620d92bab60ae73c093c1783746ea05366c9fc85690753ca95f0acf506ae2ac0753bd0c820d168da04108b58df435d8679694fa3106c8af628870b8bd8dc61973cb0749b5d638dd402fb67d8cf3a09eeb0723af63c15b2df8eb1eed84278b90e32248e12691dc504084623c0a4f24ed8394631e52caf1095e758d5aa3f1a9236beef631a9debb78776fe668298a9fd24b77b405235d2a10c4d55db683386837e21ea0f539af8ef9a126fb80120a194124d2a45f81e2a99488a98bf9ac401174ed912fd977aadfa066cd987b5321860fa1e420596ff82c4d0cd40d034760b7450cb5c665ad00056e5f109e2420ce1f967263f904e5b23a104a499a7727df34bfd4b9471d7c460ec9e630a8cfb73eca7c45d06d6479c50e5c2aeecc92202e822ca7c232c436b5766fd59ceae17f16c9142bcbcef083d2b288a055691b23ae218807effb9947918fea3d439cdb514d240e2728b4bd8992cb736dcc018a697ed8b28bc4999814c899b9dd5aec678cd48bc9869f1dbf8fbc2f0400a67736c76acc96911f0a235393bcaec40fb59ed95c53496f1b645f16924734f9aece1d6399cbecf2a8eaf72b2aa1c6944b5ae654d8bea88a2b705e31a4b14c0429d3c475fb7fdad70e15fdd38d4f7a0509b9c96eb4f9e6f9a3fee861bce6745c94bf53638cb38dc3394b296146fc588ef655ccdcde3fc8e6c3fadb7e527b61b2b320f6d19565a7b4b9951fe28041f21f2e2e1e92738fbc5295fe9b61ab7de460d386f5fcbdefe8217d723628600cf3b63fafd49f06b658aa3a027abb2de4404ccfa1f103f157cfc61e4245bb9460ac19d5e74d1a9cedbd9a66c70a61296e5cd46617ed56b0ebcb2f00535f1e37068c062f4438d053830e1e2b8cef2889054318e82a3dd16e81931d43ab9fcca54ad046095b042afd43332d261a3c2a1b421e3734c7722c9f75c615776419354f708863b02b5a100338b7f415574eb9865799b1b239df0ee069a1cbd30d97f00ef4f2d06665de139ae9026e3a2d68c7c597aef092645cba18d864d4f0d4a8c71c345de343fde8de025efe04783e6e878c57c02debadd804441621e687b9338b0d4c1c87ae343200ebd68a79591817028b14c99baa27da5ea4e87d4d816f7646414be3b1f84ed91783cd90cd42d6e22e55ad18c7c443f735574cc30e709fb07ac09c4450ebf4c2c02388ca33c02327f8f6a5abf5b44d0f2d4f5bc276e283435070f3558c7c36cf2b202c309b9c65cc242c93307ad3c1646752802bd151f0c3a59ff9dbdf03c9a9539b83ac5eeb342f727f2eeb26af257fb34c854a2329bf61ceba057f61d41019c051ae9deec935edac00c2de54653a95d9e8b5c47b8dae6b17524035f49d1ac5b39aa9ef40e8929c531f13f598479d2d48e0317b21795e80fb83735cbda5313db80e62487f394feb3a0e512e0bb2606082aaef51a7ef7069992852eb0c88d202b1c2eca14d57e5ebd73d5950465b72aa2e7fc6ae998f56eca452061ad35474958f588ae2204c6ad0322cb5a878704cb265cb1090ca186c37282aad3b0f1d901fd5741f3387084b1e03f5224ef871e1c65725ca3d83c8e005a839e8c5d923d2df82bc0cad58757de5efce5453281272328c1b094ead0ed28d2d311f4a7029a8616b1eab2a65d4cbabf08ae045ab81f4cd9bab6b4acba030f0c3d32c48c00dfd401ba10920b1eb33218b3d16dae579c167c9ab1cdd9e42295325b28dc90d999e0ae95cf7d4ef087dd6f51d96581d1fdbec34352dc633ec885f429ef059fef44cc72a8b135fa13cb5889b3da1ab9185185edd2ed477c0e353853aab96b4de370d7063bb61e367ff3e29f0f1c2049e4567e0e21b64b7745aefd5f9cc2f2ab7ab398644178235e8c6f71db13b01f6ad37b02fad68bc5fd2f5f432ec678999eb75592bb5c4c915090987f3c380ebda27bdf69564ec9606ba403cd62b4f12aafd2da3e1b22eb044969cdfe391bc03846f00fe31836b395a2fc7ebc3263bb2064c77ec89b559acd69084f000e3da4ae70fb321ddb8b8e1b99a0584466b8dcf3130a043b4f024759f0aeec829e6697e21fc0e1d2a8f76648002352f84917e92a2561b48ed87f5dcb879030f4e7fb9e3079ccffe065c6987c925dfcb2276eef8755be6c92e87b8e18cb1681cfade7189160924730013b0d63788619d8342a1bd037fa29ed8af8bccc341f5d1ff86fc89ea1a18cce659197fdc70156a567c3026b7a2b80b1b7b8c0aa5a006f742f50cc1c77154d981667692a4ae4746f2a12598bf9cdf74693d0fb13b9822e02f403d95954c4cd5dcd5a41671057972201c156cf762fabfa858518de35ea02c1313849f580570d7d26178dc4ad3ec88843598d7d6d8e3968d890d4d5aa69a971eefdbe32b7699295254c6ea76effdbb192b91165a059fd3f752d8ec69c1e623873b8edcc8a211669bdabb61f968eaf47162cf2e5745ceeda0e69c24bcf5801a1e52e6d2bab4c94ed40890448ac64c903c809f03543144306a240894ed9df18abcac5733a4f750b465d9f303ac2de258e0cd0ab94a2406648fa11dd08722bc8229c0597ba37c41096784cc686a066b48f6b213c69684b823b54351ee6ee4edec6073128944d77da43f50a9533e92286639e0e665c0bbbe1c030c7ad534e064d0e23043d12944b43d51981287711feba71bdad6f274cc59bc399736887d7043a26312df190a3ccadba2c3bc08023e4d7526e042ae56043ef61ceae3adc510ca0a39c0368f840d891344f5456d204f9bcc84857975cfa1d0c4de161edcf37f76f17e99166c3e17fc3537e3e8dea6aafebc4ed74e38d9f546f319c98b00f79548cd862e66539e584400700b20f65483e143405905ec1e31a152042eb567d50eb64d7417ca8712085222e92206c12ff32137f6497c8863443b05a4894f920d9bf60b3f494c2cb6584130f406059dd2bc514014a753fbd2bfc52e905d6084e26d15b9c8af961b626582bf7f1fca1a144db010634e6c88e52aa0ab2cf8323504a6ae2244aa6afc6fe42fbe30b4e3b25e957de81283ed4751cbe28decdc64d5c966f1eb2d1864c10d8c994016531613f892db9a1f943996bbc248e5562ece61a90935906b32a10a20abddc05d927d875c0c57bdac5f58f52b6382f35054a681054230ca0dc11b0ec11b76ad99832c8fe16cf2970d94050ecf38d6a48d8871cc3c47d612d0d376a73e49cc185592a6d5d4e41dcc031e053c2c82efd1897e597b9cef1b00331c3d3063b75bf3a7ca182c56d2c9cf78052d248cb2db4a74c10e6f831516a9738425442a75abd6e060eb48faf890676e0e78a4728545e117902ac29352d67093fa7a0db09b0d993721a1eb4a2efe513967b3eb4ca796ece488b3b8b705d86dbcba82107f35de06851ffbdf63e7ff8ef04f64b4217549be5f4d846ad41a18a7a96bff90c492d44a11b845cedb34aee79d41defb45c6af4e83674185f8e67f3b0d311d7d6d38678835ff810df3d16f6e71519861c5dec7e1cdd868b168c0dc39edef30823ae0a1d48c62dc17a1f1ea4ba5e3b48fdb1bd8b044d00baa00250f56a9edae0f4b991378684991730a89bcfcf21382cdab7d40e80239406be69fee578c3aad894ab59534c7cfeb79cb37bc9f86ad920dd1347b3a0ac6a60cacccc348698e716c3c88e7132d5d9fb51981d26580c1bdff397169c5a06b61e3dd42c61695d46217fdb685b6ed38877f46749617ca98e7983f51ee12c8ec8876f9017b726804eec5f39fc97f0fea49e2abd93cceb63842e655ba3a838fd5b2097a5af33ed83d7c1b0c63a63dc465eb5727265a2c4ffc67d14f89c165a7723d273bf1ee7697345c4161c7852f6e4e8155d3a9f6e28979b902a80ee49380673586b3a1f4b419db4e0746f49df795b08ac646e6a8efbdda36814d1c6d8eb1f038a57d92dc186309a4c11c745bee035be4043ddbbf2feae38369d2937e6aa736ab3a7c3f19282f931da278883d9e7b7fc19c783e5c9bb7e52fd9edcda9e5896e51f1bcfb02c961a1bc532948e115bd365688799e64d0dc6f9d41a5122d759c9e29dcfcf093a238f769fc480589be57464135c7fb0fca359b118e99ec880f3446b4246f6174ca3407c94a509b4596dce118de48c3d1f47896297b77cfea3e411e5accf8c282b053dc7d6d5b00911be47b1dad020bc1614d50e1eea05244beceef277eaafe96ed27c909186c5c22f886495d8756394227de4a1fa9e8f7b469b72206395bab16b39c0b8a393887146ab37c46986eb32fe4037e8f6f7d8fb2fc451a1a5fe15f8d515bbc6afb1422677f46f6bf13da2c797a594204e987ccc3de5545e0dceabc16cd600860f1a23a1bb46928449e0cebae8a79c7f5e2813f6a0a76e331295d54784a8ae76869b98ea135476586f2e2a747a7ad1630976f01f926e5c9e156ad89f50dbe8a7ee8dab98b95bf2d123465b9ed85b6bac4147989ee8cf797b228d4b6539c04e2245b442f214fde20c07f5c2b01fa77c6159b7eccd54f5c83edc4ab0c0b3a83ea0365045fe2179be1d4744eca28037111dbb6dec4c53186465efbefc8225736af67dea5260832f7556e6df3411561860e6149695a6eebe50fc05789d2acab2ccd0f1249b277c3540104b212977acdecdff2dff4730ba43f6585c1f361f2072180999cd224cc7762307242853c8bdc4ec28eb984d5870ef1841efa05c8a210aeb68365b10dfc312cd79ab386e19fa0461a0b08ff87cd9c1b9faff74000a0c865c7cf3bd71e37ffba01aa780f05443624c169b686271c52257f0b0384bebfabb151d84d0bcaeffd81cacd1e326db8e0f141f4517b592332cc6a688e747fe21c19d35d3d9db627690cb9342a6731510a8134bc1228ed14aabe2f117d"}, {0xa8, 0x116, 0x0, "86b30c67630fdde7a9202ba87831d47eb6c5bdd164e26d60fadb0d24bb68831d78c87b25f6ff9357f2473d01cb2d353d79ab79decf680b4a694f59b2e4aef14bccfeed091a5ac6ad8b61202802980b06bd4f6312f22442554887e233f0b9e2aecefc749547cda9694c4ddf858eef1f5d1288cdb4c33f58026e3aee17e39a6689af1d401c2ab3a557dbfa16a7ce0e584f0b7434"}, {0x1010, 0x107, 0x56, "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"}, {0xf8, 0x114, 0x3ff, "77340b82da50201ec4011b9d7e6d6811e3e86ca0c155072388e2afa046638af7df54e1ad54666a8a8f694d4184b723f6900ab418c4a188f51f8f3539be66d638a442265451813259524cea8b3e81d186826fbbe8c4f09e62efd09e93621720b00502a5a37ffc170544d9ee9f72c6dc305cb4ffdaa49325d77d3b6050bb1a867e16f0f4b7b0438a4486a2cf151e52200eab34f598e273e31e737fcb22837953f7ba8ceab2cff50a0e4a889bad4c07d68ec5b162c75b33799cd5810c729f9208077d95a6128fae086f2d173edb96379b8027b6cac93930ba6be1acffda8a643b54733ada7a23ba"}], 0x2290}, 0x200080c4) r5 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000005340)={&(0x7f0000004240)=@tipc=@nameseq={0x1e, 0x1, 0x1, {0x0, 0x0, 0x3}}, 0x80, &(0x7f0000005300)=[{&(0x7f00000042c0)="6b1a105cb117525450a5dd7e876227b9b46b2066395aa36c262680eea039666065440ed0623ac5a5f9a684", 0x2b}, {&(0x7f0000004300)="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", 0x1000}], 0x2}, 0x80) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f00000000c0)=@llc={0x1a, 0x307, 0x0, 0x6, 0x2, 0xff, @broadcast}, 0x80, &(0x7f0000000000)=[{&(0x7f00000001c0)="c092ae4d9ac4cddb46590e6586f8a2ded258e7155171e8eb84894d168f42708a4e896683671b993c2d38085e1fa0fe85c0abd22277c7dbb496596eb59b33a54091380f24b3287527930b6b6dd84526711fcdbbad3e56a4e42d3d92eea727686524871841e4ec86a33dbc1862490c8241346b35351d7787cd312c70ed4da223e47b568ce80a687f995c9b3d2f9091fb41caae331fb0bc2784bf8efc96c6ec9a052749a4cbc00afbe2c81b9147f3a0b2d10aab32f9da1a229213ed9e94d35e71bbcd1b413786b9b1cf84c89d9e7787230c796885f961beb1aeaf121d93a3a0eaed329f15c7a3f0a1bf73f1951edd55e9e708ea", 0xf2}, {&(0x7f00000002c0)="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", 0xfb}, {&(0x7f00000003c0)="e225f7bab329e94bba82d66b8e88efd46e803c0aa0c2d1f67c67cf7913694620e23875264e6bc483b4d806e98590455e2b398f85522979db4925b70e67d2f29433a52ce3b573117a4c70106de9834431a0db9afea2da5092a338d36f13dd307afa9636eeae58fac2357bb79e958460e87fcb157ee2bcbb281dd4826131078f00904e98da87a92e81e9e6b413583039e5fd88a34a460ba518bb674a1ac925b1b94984eadf434f0e6eb56c5a89fdebe2ba3016f032800fdf5d8f333a98a7d68139e615cc064d8f74db00cbf63f6dd01c2af57eab7a10779b5d0d3af908", 0xdc}], 0x3, &(0x7f0000000900)=ANY=[@ANYBLOB="d00000000000000018010000080000001ca412ac900e268598b63ab2f685ee251919b91e65b5dcb72924f56edf7b95342dd5a166f9bbf99ded20da82cebb313f5a35a8753abae9af88a3ce1d8d6166c9dad98a462faa7da69be944aa170862fb3cfb1362ed153ebfe9ea3e3465460d7fe910a54107e7ba382346ec56a7082f57a25af875d452dd2d2a66d492fe39292f135315565df942155e6025d31112538cd6f97bd115b04082b5833cbaea6693ab7287cd8249aad29374d36ddf13224ce3c3eefcc6a5ddb5c5cf2ceb80000000000001000000000000130100008100000062411502565c32bc60414c3b98d0ea02d3b353de43a6bb3d1292e94092165ee8d519ebe6b7e9181e89d59d12cf66883404977e17ca1461aaa14373e87f4ecd805aa98daab9da2ced058857e5420cfda29085baaea1ad73024ca0227faa0d7504d94976d75b381f240e761ea44e0a4d1e74c0db5c7e91e9a7060e4583b14b3ff9ec56375168fcdbe7f70a130c84aadbb447f0458c69ac90807390b29520f4833c30973bbc33d288491b28c0bc6fe3cadf30ddf91540f2c3b12e0de88065a8c05d6934069764f59591fe8c677f9d7edb7b8b85af909795c72ba4a17e0b1674db79113ad56533c6b0b96300000000000000a0000000000000001301000006000000e0f08e6fbcf430d7800bd77e915fcecfc5d05faeb5e962a6efbc86b96a1f51f06dfd1992ae73fed6d19c814fb61751950f996bc490bf74c3f1cf93a7ac81afa0951538d3fed39c2dcd4cb42410d84edd89bce2cfc9f4bb0c98993998526a39ecdcb8278f99488e8542c8fd3c1392c205ca8dfe3ca73de548f801e3f38bd1df97054c3638eb1a4ee4ef000000000000000801000000000000040100000700000056f844a1b8f88b0ab7a31aab30736a82a23c1257d1a99a2caf174bfcabad6126061a37c906b61ebd8eb9786881b7000a60c8d071311ee6d682223b4f574800375293f8cbbe906a89d3962a1a257765d02fc699fa910326a6236c215533c5634f6e3aac414599ca08c2f6872f1600bdadae30e91fe61116eca6abd2e804a8f83461cefefa8fc108ffb904e8ff9c18cb4424028050a569a8efd0ec82dc030439530b80752d1736178cf60c9ba1271b80ef8eb4b7611c97edd063d3ab017a343dc3ceab9539f9c35c064717576d22fa947f3c4339ebe4f0db94ca1e12b30010c6e6a14871493b4f392725da0f60ccc9a4bdc64fef6455c2000048079c675986406714f6750f61a4d4e31da00fd2718fbe81e2f0fab0174dc0f9253144e9855a1e4abcab5925c00184f7d7fd615357ed152c3d62ddc3c687f578dc67de5aba19372c2c59346e7a48449f3889bb90d4b2b69b7d96574005cf4360a491635d9e0ca20d348a61c28ac531d9510f46deb7c3ee23add1141fff6d0c5492466dddfecbc5c3b48b8e4e6f7e5682c37a279e7ad5bc97477c382a27fae7605d55153f0eb9"], 0x378}, 0xb2591fb7ed791996) 00:49:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x81, 0x0, 0xe1, 0x0, 0x1, 0x90800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0x6, 0x8}, 0x8, 0x20, 0xffffffff, 0x0, 0x4, 0x2, 0x7f, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0x1}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x41) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, 0x63) mount$bpf(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x4800, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0xffffffff80000001}}, {}, {@mode={'mode', 0x3d, 0x6}}, {}, {@mode={'mode', 0x3d, 0x2}}, {}, {@mode={'mode', 0x3d, 0x5}}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_lt}, {@fowner_lt}, {@fowner_eq}, {@subj_user={'subj_user', 0x3d, 'team0\x00'}}]}) recvmsg$unix(0xffffffffffffffff, &(0x7f0000004380)={&(0x7f0000000f00), 0x6e, &(0x7f0000004280)=[{&(0x7f0000000f80)=""/40, 0x28}, {&(0x7f0000000fc0)=""/218, 0xda}, {&(0x7f00000010c0)=""/4096, 0x1000}, {&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f00000030c0)=""/164, 0xa4}, {&(0x7f0000003180)=""/217, 0xd9}, {&(0x7f0000003280)=""/4096, 0x1000}], 0x7, &(0x7f0000004300)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x68}, 0x10000) recvmsg$unix(0xffffffffffffffff, &(0x7f00000054c0)={0x0, 0x0, &(0x7f00000053c0)=[{&(0x7f00000043c0)=""/4096, 0x1000}], 0x1, &(0x7f0000005400)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0xb8}, 0x1) mount$bpf(0x0, &(0x7f0000000680)='./file0\x00', &(0x7f0000000a00), 0x200000, &(0x7f0000005500)={[{@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0xab}}, {@mode={'mode', 0x3d, 0x7f}}, {@mode={'mode', 0x3d, 0x74e}}, {@mode={'mode', 0x3d, 0x7fff}}, {@mode={'mode', 0x3d, 0x73000000000000}}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', r1}}, {@fowner_lt={'fowner<', r2}}, {@dont_hash}, {@euid_gt={'euid>', 0xee00}}, {@smackfshat}, {@fsname={'fsname', 0x3d, 'fowner<'}}]}) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000100), 0x6e, &(0x7f0000000cc0)=[{&(0x7f0000000280)=""/194, 0xc2}, {&(0x7f0000000200)=""/28, 0x1c}, {&(0x7f0000000380)=""/99, 0x63}, {&(0x7f00000004c0)=""/196, 0xc4}, {&(0x7f0000000840)=""/197, 0xc5}, {&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000ac0)=""/80, 0x50}, {&(0x7f0000000b40)=""/157, 0x9d}, {&(0x7f0000000c00)=""/154, 0x9a}], 0x9, &(0x7f0000000d80)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0xe8}, 0x100) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x3200008, &(0x7f0000000e80)={[{@mode={'mode', 0x3d, 0x1}}], [{@seclabel}, {@fowner_lt={'fowner<', r3}}]}) mount$bpf(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f0000000800), 0x280302d, &(0x7f0000000a40)=ANY=[@ANYBLOB='mode=000000000000000000', @ANYBLOB="2c736d873f3c8dc361728d3e3874da1f26eb9957966cc3640c8bfe06d758f841f0636b6673666c6f6f723d6e732f757473002c7365636c6162656c2c7365636c6162656c036106255fb7d888ce2c7375626a5f726f6c653d7365636c6162656c2c61"]) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) [ 1451.436283][ T37] audit: type=1804 audit(1632703791.170:627): pid=15642 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2331/memory.events" dev="sda1" ino=14676 res=1 errno=0 00:49:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0x4ea00) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0x4ea00) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xc, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff0000, 0x0, 0x0, 0x0, 0xff}, [@initr0={0x18, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000080)='GPL\x00', 0x10001, 0x76, &(0x7f00000000c0)=""/118, 0x41000, 0x1, '\x00', 0x0, 0x1d, r0, 0x8, &(0x7f0000000300)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xc, 0x7, 0x8}, 0x10, 0xffffffffffffffff, r1}, 0x78) close(r2) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x3c}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff66}, 0x48) r3 = openat$cgroup_ro(r1, &(0x7f0000000400)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0xd, 0x7, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xca0}, [@map_val={0x18, 0x7, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x400}]}, &(0x7f0000000480)='syzkaller\x00', 0x5, 0x1000, &(0x7f00000004c0)=""/4096, 0x41100, 0x2, '\x00', 0x0, 0xd, r1, 0x8, &(0x7f00000014c0)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001500)={0x0, 0x3, 0x4, 0x8}, 0x10}, 0x78) [ 1451.613910][ T37] audit: type=1804 audit(1632703791.630:628): pid=15673 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2332/memory.events" dev="sda1" ino=14019 res=1 errno=0 [ 1451.936047][T15686] bpf: Bad value for 'mode' 00:49:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x900000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) [ 1451.979094][ T37] audit: type=1804 audit(1632703791.911:629): pid=15673 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2332/memory.events" dev="sda1" ino=14019 res=1 errno=0 00:49:52 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x47}, 0x80, &(0x7f0000000340), 0x0, &(0x7f0000000180)}, 0x4810) socket$kcm(0x11, 0x0, 0x300) r1 = getpid() perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x5, 0x1, 0x6, 0x0, 0x0, 0x8, 0x20, 0xb, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x968d, 0x1, @perf_config_ext={0x200000, 0x6}, 0x2200, 0xd4, 0x80, 0x6, 0x2, 0x0, 0x5, 0x0, 0x20, 0x0, 0x6}, r1, 0x3, 0xffffffffffffffff, 0xa) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000280), 0x10, 0x0}, 0x400c080) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYRES32], 0xf0}, 0x0) [ 1452.071997][T15689] bpf: Bad value for 'mode' 00:49:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) recvmsg$kcm(r0, 0x0, 0x40) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000440)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\n\xb5\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf4&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xeb\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x1, &(0x7f0000000000)=@raw=[@ldst={0x1, 0x0, 0x0, 0x0, 0x8, 0xfffffffffffffffe, 0xffffffffffffffff}], &(0x7f0000000080)='syzkaller\x00', 0x101, 0xbc, &(0x7f0000000200)=""/188, 0x40e00, 0x4, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x0, 0x1ff}, 0x10}, 0x78) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xe, 0xc2d8, 0x3ff, 0x8, 0x4, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, r2, 0x4, 0x0, 0x1}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x4ea00) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(r4, &(0x7f0000002000)={&(0x7f0000000a00)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a80)="f9b75141851aba8cbe67ffc9ea09496abba7d045a3f316bc5b81d2213d6d31ab37a60a12bcc932555bd81e6fa75d40e9d804e010b54a17ed7305112591dc4da7b004369d7581dfd331fdd4b871e48b7c5d100584a38036aff745b74108ea7f2258ea32229b58bc438ed5501a5bc7a0b24ddb80ec1dd1e50fa578cf4cd94ea8050e3e6273a87e1e001b207ca3828984be401a42339296902747e1348e0629c78ac79fb646d661c8522a8be47f0579061429246ca58456ec9184f52fd39b5d83c7e3e6c5065c66b28c", 0xc8}, {&(0x7f0000000b80)="de7a1e8c222919340e83a2dae631c00b2393a68463622264091d79238fd12044af9a3cc676f665fb004c9f56785b1fb6b709b2f91968fc91082d90b2bff690d25628800b5b32c279b3b6d3154afb73804c1ccc0739ccf3aa3bbac6b1eb629ddafed2b7c68c7f146b6dfd3bb914cd5b9818c05327221ce19371b959840383fd2edd315690c8610550f68a3b8ad87d405f706bea3104602dcd", 0x98}, {&(0x7f0000000c40)="a8585aa7450957d65483119eb808c0b8f126f738584e121d61515f8422945f0a8db782679bc3", 0x26}, {&(0x7f0000000c80)="ecbbf498bba14ccf571deeb08633cadcb4083cd2a9ee958d6a169becd47c4acac487fdacdd4972f4f74f6d8465b9cc09b4dc3f6830c41da909309bfc728f7345f5638d66669cb1d3ef3a35edb89ed2ee9f69049a718a8369db50cd3a23d5d6ce3b72ee2beb9aec969eae5496853b97bc6ec2dcaebe485ddd77d795bc97ba96fc", 0x80}, {&(0x7f0000000d00)="c3cd40b5949b5fc90c9333c39ebdc62d2edb3d05309633e27ccd9a41600947de8d3afbfdd063ec97c62c630c82dee26ce02b7f31d7b2e288b44ba6dd68c0333ecb1e3a2d1fdf4cd511490e321f897fb247d61045c7493f7c09497ab555edab3172715b5de304d92cc9827689818c291bb174d1f30e4cff15a800ab520739554095d7de77f701bd948c2d9f7f4f31f1f1920d3c80200155f1a6226abe473ac50ec07529244485afcedd", 0xa9}], 0x5, &(0x7f0000000e40)=[{0x98, 0x10f, 0x5, "cca087df2d5a7f57905c2b8601a92d4e82ffe7d5c037795333c6010fe4bbb2ef0fb7d86f4123912eb9ab382c081aaab0bd855b404c9d6195db2835024c633ec02a92d49bff42abe5932f82321435ee626d066957f53e5edfcc32b01f33f241caf0f8a887b2bfe6c8d7fa3cb17d18eb62563e060f731fa4c32cace8aab41f8ca18330"}, {0x48, 0x118, 0xda1237, "d2983fbdfda0f7d1bdc546f8aeecec166f1f2c3aca1a8e514bf966fda9268fc3bcc0c9261681ef22e0566d2c370c4945a2b4"}, {0x1010, 0x3d5, 0x0, "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"}, {0x30, 0x1, 0x80000000, "e234a3b1c082b1cfaec7bbf25a739ac32cad441f705acd8b9198eb"}, {0x70, 0x115, 0x6, "b846f7b1240bf1a427d08612675c096762d47365eb92707eb90cd5b05dec4f2c742a3d253bc713fdd97d15b42938765175a2011a4d55c142995c83878ba7001b6923128d68cd3f129209c671e3f6ca2a03c71e6ccf0b794fadf5"}], 0x1190}, 0x4000) write$cgroup_subtree(r5, &(0x7f0000000200)=ANY=[], 0x4ea00) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x9, 0xd, &(0x7f0000000380)=@raw=[@call={0x85, 0x0, 0x0, 0x77}, @jmp={0x5, 0x1, 0xd, 0x2, 0xc, 0x10}, @alu={0x7, 0x0, 0x5, 0x0, 0x9, 0xffffffffffffffc0, 0x8}, @ldst={0x2, 0x0, 0x6, 0xb, 0x5, 0x40, 0xfffffffffffffff0}, @map_val={0x18, 0x9, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x0, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0xffffffff}, @alu={0x7, 0x0, 0x9, 0x4, 0x0, 0x10, 0xfffffffffffffffc}, @ldst={0x2, 0x3, 0x1, 0x3, 0x0, 0x50, 0xffffffffffffffff}, @exit, @map_val={0x18, 0x4, 0x2, 0x0, 0x1}], &(0x7f0000000400)='GPL\x00', 0x1f, 0x43, &(0x7f0000000880)=""/67, 0x40f00, 0x4, '\x00', 0x0, 0x20, r0, 0x8, &(0x7f0000000900)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000940)={0x2, 0xe, 0x9, 0x80}, 0x10, 0xffffffffffffffff, r5}, 0x78) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0xffffffffffffffff, r1, 0x0, 0xe, &(0x7f0000002040)='memory.events\x00'}, 0x30) 00:49:52 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0x4ea00) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100), 0x6e, &(0x7f0000001800)=[{&(0x7f0000000040)=""/45, 0x2d}, {&(0x7f0000000200)=""/52, 0x34}, {0x0}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f0000000240)=""/12, 0xc}, {&(0x7f00000015c0)=""/119, 0x77}, {0x0}], 0x7, &(0x7f00000018c0)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xd8}, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001c00)={&(0x7f0000001a80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x50, 0x50, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x5, 0x64f6}}, @restrict={0x8, 0x0, 0x0, 0xb, 0x2}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x2, 0x5}]}, @restrict={0xd, 0x0, 0x0, 0xb, 0x4}, @typedef={0x0, 0x0, 0x0, 0x8, 0x5}]}, {0x0, [0x71, 0x30, 0x5f]}}, &(0x7f0000001b40)=""/169, 0x6d, 0xa9}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001e00)={r1, 0x10, &(0x7f0000001dc0)={&(0x7f0000001cc0)=""/243, 0xf3, 0x0}}, 0x10) r6 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001ec0)={0x1a, 0x7, &(0x7f0000001a00)=@raw=[@call={0x85, 0x0, 0x0, 0x7c}, @exit, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, @exit, @call={0x85, 0x0, 0x0, 0x76}], &(0x7f0000001a40)='GPL\x00', 0x4, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x21, r4, 0x8, &(0x7f0000001c40)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000001c80)={0x5, 0x0, 0x8001, 0x2}, 0x10, r5, r6}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xa, 0xd, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x7}, [@alu={0x7, 0x1, 0xa, 0x5, 0x1, 0x80}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, @generic={0x41, 0x7, 0x8, 0xfb, 0x5}, @call={0x85, 0x0, 0x0, 0x4}, @jmp={0x5, 0x1, 0x2, 0x7, 0x5, 0x20}, @map_val={0x18, 0x7, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @generic={0x1, 0x5, 0x3, 0x6, 0x4}]}, &(0x7f0000000280)='GPL\x00', 0x1, 0x5, &(0x7f00000002c0)=""/5, 0x40f00, 0x16, '\x00', 0x0, 0x37, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x5, 0x1ff, 0x4}, 0x10, r5}, 0x78) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = perf_event_open$cgroup(&(0x7f0000001e40)={0x4, 0x80, 0xfd, 0x7, 0x3, 0x1, 0x0, 0x90, 0x87, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x2, @perf_bp={&(0x7f00000017c0), 0xb}, 0x50, 0x8, 0x1, 0x3, 0x100, 0x1, 0x32c, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, r3, 0x8, r2, 0x1) perf_event_open$cgroup(&(0x7f0000000400)={0x5, 0x80, 0x6, 0x3, 0x40, 0xe0, 0x0, 0xfffffffffffffff8, 0x5150d, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x7, 0x5}, 0x80, 0x4a0, 0x9, 0x7, 0x9, 0x6, 0x3, 0x0, 0x68, 0x0, 0x1}, 0xffffffffffffffff, 0x4, r7, 0x6) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03003c000505d25a80648c63940d0224fc601000024009000400060082c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x8, 0x1, 0x1f, 0x2, 0x0, 0x0, 0x4, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x5, @perf_bp={&(0x7f00000000c0), 0xa}, 0x8020, 0x800, 0xad6, 0x5, 0x3f, 0x1, 0x4, 0x0, 0x101, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x9) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 00:49:52 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:49:52 executing program 0: r0 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0x4ea00) r2 = perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0xf4, 0x4, 0x2, 0x2, 0x0, 0x401, 0x100, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8000, 0x0, @perf_config_ext={0x200, 0xfffffffffffff001}, 0x1, 0x3f, 0x7, 0x7, 0x2, 0x7, 0x6, 0x0, 0x6, 0x0, 0xffffffff}, 0xffffffffffffffff, 0xd, r0, 0x1c) perf_event_open$cgroup(&(0x7f0000000280)={0x2, 0x80, 0x80, 0x1, 0x5, 0x8, 0x0, 0x603, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000040), 0x9}, 0x4100a, 0x3ff, 0xe0, 0x5, 0x7, 0x4, 0x2, 0x0, 0x8, 0x0, 0x7}, r1, 0xe, r2, 0x7) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_allocate_inode\x00', r3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) [ 1452.732661][ T37] audit: type=1804 audit(1632703792.791:630): pid=15705 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2333/memory.events" dev="sda1" ino=14679 res=1 errno=0 [ 1452.742160][T15706] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 00:49:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:49:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0xa00000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:49:53 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x900000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) [ 1452.912630][ T37] audit: type=1804 audit(1632703792.961:631): pid=15705 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2333/memory.events" dev="sda1" ino=14679 res=1 errno=0 00:49:53 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) perf_event_open(0x0, 0xffffffffffffffff, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x4b, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x3f}, 0x1a020}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1710, 0x0, 0x0, 0x1}, 0x0, 0x9, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 00:49:53 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) [ 1452.997652][T15706] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1453.155684][T15711] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1453.219121][T15711] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1453.277870][ T37] audit: type=1804 audit(1632703793.331:632): pid=15726 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2334/memory.events" dev="sda1" ino=14690 res=1 errno=0 00:49:53 executing program 2: r0 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='cpuset.memory_pressure\x00', 0x7a05, 0x1700) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x2, 0x0, 0xf7, 0x0, 0x0, 0x0, 0x80040, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x8042, 0x6, 0x9, 0x9, 0xffff, 0x2, 0x800, 0x0, 0x7, 0x0, 0x9}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0x4ea00) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x6, 0x4, 0xb5, 0x2, 0x0, 0x80000001, 0x100000, 0xc, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80, 0x0, @perf_config_ext={0xffffffffffffff00, 0x1860}, 0x1, 0x2, 0x7fffffff, 0x0, 0x5, 0x7f, 0x101, 0x0, 0x1000, 0x0, 0x7}) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x60}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)={[{0x2d, 'memory'}, {0x0, 'pids'}, {0x2b, 'pids'}, {0x2b, 'pids'}, {0x2d, 'pids'}, {0x905fbc4e1f1f2584, 'pids'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'memory'}]}, 0x3c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='btrfs_inode_mod_outstanding_extents\x00', r2}, 0x10) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@timestamping={{0x14, 0x1, 0x25, 0x2}}], 0x18}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000340)={0x2, &(0x7f00000000c0)=[{0x28}, {0x6}]}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)) 00:49:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1453.804119][ T3926] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) 00:49:54 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:49:54 executing program 5: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x110, 0x4, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x800) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000004c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1, 0x2, {0xa, 0x4e24, 0x9, @empty, 0x2}}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000100)="a1e96881", 0x4}], 0x1, &(0x7f0000000780)=[{0x100, 0x10d, 0x10001, "2ac00652d29e4443afcedee58919cda4c398d82c9fd35146919410bee04a57475c4f7d39e14f4701f5b5bdfb3335bbe6d2d08f83c0137fd3ff68ae0e9b912dc27a39ba94a3673342bd2e2845d8f2d9eee0fdaf7149f68c5cabeeddee0f65e63c4b011e9f3c47d62bb6d358c786627d17da513379531cbffd86143c3531e3e1e6cef7de8b2a0c5440761e57e9ed696ba134a7afb75460d157ff83b5a30a88715e0d5a20d0d029e5ce23675f85a505616cc4cf88f7cfbadfa51db7dbe16169859d0c87042e486651bbb4e39857d9cdcd72567929476d730dff89719f308ff87e5b4d4c9b1bc6640549c523e07bc7"}, {0x90, 0x10d, 0x3, "e8a284fcecec6e01049c3d57d382ac06b0aaaee3088ced16c9f236cdeb6ad949d89f354053fa64750ccd74c306e81cc0134cd14559b8e3c660de89b6c592879d24b2c9d26453f3c39615b5ebcd3e81b8b57d134b7bea5757b9d6eeae6c418895155930dd3072f73dda0ac332532309793e2b59b598e069d9810077"}, {0x58, 0x1, 0x0, "4fceacf623ae97d49badd506f437384727d50bb26ce15e3a94926f28b4db0aea5a6c227776e5059b0681d5fc9525bf7db60861ee74c1835847229f87cf3eb4b546e89ebe"}, {0xc0, 0x10b, 0x7, "1fa92073fb8e647e6bfbf9736a19d921b3a3d1297bc38eb070099b3d1c4044abed291a64d6d5ff4c85af2118328713c3dcfcc59d00a5b7ec3d181bc6f8747cd6a7a83fcee41e5e3b87f90370140e45aacf61f3d67c8ffe3d792a5ed4084534d89aa1ac9ae38b283b0ebcbc5db6741c13a70f5e83402ce8abf43ca723a507a43138d7053c5c45683f11f0c7d1d10dc57b67fb68e644827add40810a86cb45e437156649409b0172e2efd1"}], 0x2a8}, 0x4) socketpair(0x0, 0x800, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x55, &(0x7f0000000240)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x600c884) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x1ff) sendmsg(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0)=@rc={0x1f, @fixed}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB="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"], 0x528}, 0x20000080) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001680)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000000)="18a011442443104b9a", 0x9}, {&(0x7f0000000640)="f8b17e779a2dc5621524b730ba3a7de36d73a5e7fb63fb87e2346df8360053c0b7050561a6d9aaf5c44d4f7e8002a7f1a31ca5edd033feb8b99f138e3c7bb70ea1b4fb316d6b82d51374f7d2964aba62d3320033863518", 0x57}, {&(0x7f0000000c00)="11cba61a478c88f17cfc454f8eef8f13ac1e35483e08198e49f87fe1e8fa60639b789219ce6b813e13d686eca9b9e18df2", 0x31}, {&(0x7f0000000cc0)="b164fdf2ad7d374535cfb10a11ce0d25fb78f440a942e56516b2f1e82e16", 0x1e}], 0x4, &(0x7f0000000a40)=[{0x30, 0x113, 0x0, "fef8aab04e42cd76618f8ddbc6fc23c5d840e5f1ce4213bcceea"}, {0x90, 0x0, 0xfff, "1b24f5bcd6fbe0a2db770fd13058ff1498cb16f4113a9f69037c9d01c62f8b3e7f66bd55a41e7243e234b308cb4d6334c63e5de94d9d7156d3d8f7684ff7da62874836fcf924e206f5013992fef7e69cc580c5a098804dcbc26e95547d38220268e76240da41ba27b185d095636020a8bbe7763562c02a749bfbeaba92"}, {0xe8, 0x0, 0x10000, "9b307db64666c216f75e922afdbd57a710c10f05df47592e0027067b816eccc16bfd26c997be733dd013473cbefb6dc37566b5762add56baf6e413fb1c0bea8d387035754d6684296644c1628c3244666e7d38c2b140bc51771f8923e9f17eaaa61b63a3a76953b354acd138cfa4d225d9d15f34d24677822a118d049f9e65d06ad6b39e2932ba8cd6ce26e571a2f2c68b4b9c7f3f65a7ac5c8f579907f952423d56f134dd135a1e90e1547cda27e3e642cac8c058b2d108747b0b38612fdac78b1c590f65f6a7a4c192b9b7233505479c772c9656"}], 0x1a8}, 0xc) openat$cgroup_ro(r1, &(0x7f0000000580)='cpuacct.stat\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000003ec0)={&(0x7f0000003e80)='./file0\x00', 0x0, 0x38}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='rxrpc_rx_discard_ack\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(r0, &(0x7f0000000f40)={&(0x7f0000000280)=@generic={0x2a, "a59d07dee749afe12c417b93592ab8adbd051d4321806ae521401174bd6fb3c06e0ca3e31922254872ac68f0195823546b2610a6983e870e8774de2aff6f0adba3c407da0a87e3008c1be87c221d41a8656a1ea46561157c56fe0314c25d8e571ad502efdd0712473552d783239e42a9e7a52ccd0ee99ef013e92060a6f8"}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000006c0)="0c7924b5941c6f79b38f131782aecf429fdf8505b52c34f3eba85b0cca1b14bd0b8c057b01fbf0d7de77654ca586719e4e19778d9292a2687e3503e6f35ecba8374f16f00d02681a6f630c742da03a878d8fdbad008634", 0x57}, {&(0x7f0000000d00)="4148525ad16e15a7af63bd6102678767103a881127891377ee47d9e08eeb038bb5b2a1a43df9902a4c0c3c2d87974aeb5801ff7168044a22550ffa77029358cc7b8d869dfa71a008140adc981e157bff719a71f4064aa2a6879659ace6e3e2e8", 0x60}, {&(0x7f0000000d80)="d33f7ca19251dafbc19954dce40c2a5ce4306a9f5b5995879a9ccb3d39aa91e9134dacd539ab35ce77792adcb7b77f00c84f285c57724a526b20e766bb4758e779274935e5affae31457f96bfbfc73b103407bcfa6a7ea17aa4027aa6dc990fbf02174299a42808d9860a2ec21a9afcd8220191eb165b071c64840555f790c3d48a2168c1e4d76454b31b6f6bab1baf59513c7d9a5ba99c620765fec05aec7d600d33bbb14c5f43747b7", 0xaa}, {&(0x7f0000000740)}], 0x4, &(0x7f0000000e40)=[{0xd0, 0x10e, 0x3, "af4f42a1a071819359d64139442a6496a5831d22e251d01717f5c51ebb7a4a880a0a66fd64158181688adfac82146165f177057bdea4b4866e2abcce804d2bb9c8ae69fea9440ef0f72d605f1401cf63cbd0c1a3dab2fb119ce469ee5497273472adcff9ec0e51e90b3bc1c8162f2468f2584eee3090ce56a390560e88eee74c6b78ee0c6c33417f7cbabdfed41101bfdf9cc40e8acde1746cbd8157f282f9da05d816750b1a86568aa8763393bd4ac7af72f6650ec6da8ab0bfd78b"}], 0xd0}, 0x1) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0xfe, 0x2, 0x45, 0xf8, 0x0, 0x8, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3ff, 0x1, @perf_config_ext={0x1e, 0x5}, 0x14004, 0x0, 0x0, 0x3, 0xffffffff, 0x83, 0x7fff, 0x0, 0xff, 0x0, 0x7f}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x0) 00:49:54 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0xb00000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:49:54 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, @perf_config_ext, 0x18008}, 0x0, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x4, 0x80, 0x3, 0xbc, 0x9, 0xa3, 0x0, 0x0, 0x824, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000340), 0x2}, 0xa00, 0x3, 0x1, 0x8, 0x1000, 0x1000, 0x3, 0x0, 0x0, 0x0, 0xca9}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000005c0)={0x4, 0x80, 0x8, 0x4, 0x40, 0x8, 0x0, 0xeb8, 0x80000, 0x4, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x4, @perf_config_ext={0x7, 0x401}, 0x800, 0x8000, 0x534c, 0x4, 0x1, 0x5, 0x9, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x4) r2 = perf_event_open$cgroup(&(0x7f00000003c0)={0x1, 0x80, 0x6, 0x76, 0x6a, 0xfa, 0x0, 0x0, 0x9, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x81, 0x2, @perf_bp={&(0x7f0000000200), 0x2}, 0x10000, 0x7, 0x6, 0x4, 0x9, 0xfd05, 0xb89, 0x0, 0xffffffff}, r0, 0xe, r1, 0x8) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x27, 0x6, 0x1f, 0xd, 0x0, 0x4, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x81, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x4200, 0x5, 0x0, 0x9, 0x1, 0x8c84, 0x2b56, 0x0, 0x6, 0x0, 0x40}, 0xffffffffffffffff, 0x0, r2, 0xa) r4 = openat$cgroup(r0, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000440)='memory.current\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x0) getpid() perf_event_open(&(0x7f0000000480)={0x5, 0x80, 0x8, 0x4, 0x2, 0x8, 0x0, 0x7, 0x400, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x758, 0x5ecb64c4d7d9488d, @perf_config_ext={0x401, 0x245e95ca}, 0x4000, 0xff, 0x2, 0x3, 0x7f, 0x5, 0x3, 0x0, 0x6, 0x0, 0x40}, 0xffffffffffffffff, 0x9, r3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$kcm(0x29, 0x7, 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x402862, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x0, 0x80, 0x20, 0x5, 0x80, 0x3f, 0x0, 0x5, 0x290ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe8e, 0x4, @perf_config_ext={0x4, 0x4}, 0x2136, 0x2, 0x1, 0x4, 0x7, 0x3f53, 0x4, 0x0, 0x502d9a20, 0x0, 0x8}, 0xffffffffffffffff, 0x6, r3, 0x2) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x200000, &(0x7f0000000640)=ANY=[@ANYBLOB="6d6f64c72430303030303030303030303030303030303030303030332c6d6f64653d303030303030303030303030307c8225483030302c6d6f64653d30303430303030303030303030303030303030303030e8597569643d", @ANYRESDEC=0x0, @ANYBLOB="2c6d61cbe43d4de053a01981f16ba926e7187d6b06b04e084292eae15717e750d12673be5d82d90458bc90c1ea657083ccda1906912d611648b400ecd90f705de1feb82bf6a1a721c1bd398cdcf603e629796e48e456df1518b3982613ab7094a8becd861d00581034f55c57611cffb3da9014e001d77965266c8d3da3b6e78fd8fa8e28735130da9ccbe1d0904aeb425e59cd471cf88d"]) 00:49:54 executing program 2: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x341141, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'ip6gre0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x2, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b5ca295a5dddcd4c15b7b30feb0501985eba1676af671e0000000000edc24caa4371466a1a4804004cd3887a4c5e05307176c808980000000080000000000000000044a85661032eb947681f77df4704c7ce03bc04cf7776c2bc546dff4145b509be902cdf6575f957de9626da0c3daa2e31ccb472197cdff05aa1e69e3ad7a84ddc53b2749ee59da5dc79a3edaccd32235e003132ce1ac21ffb76a51e9c428fbe8874c9"], 0x0, 0x0, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0xf, 0x0, 0x1, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x1}, 0x40) r2 = socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x6, 0x0, 0x2c) recvmsg$kcm(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x48) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000040)) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000003c0)=r1, 0x4) socket$kcm(0x29, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x6, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @alu={0x7, 0x1, 0x7, 0x1, 0x4, 0x40}, @exit]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x10, &(0x7f0000000440)={&(0x7f0000000400)=""/60, 0x3c}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f00000001c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r3, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 1454.370596][T15758] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1454.463462][T15758] device team0 left promiscuous mode 00:49:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1454.508394][T15758] device team_slave_0 left promiscuous mode [ 1454.587707][T15758] device team_slave_1 left promiscuous mode [ 1454.660117][T15758] bridge0: port 3(team0) entered disabled state 00:49:54 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:49:55 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) [ 1454.943235][T15762] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1454.967334][T15762] bridge0: port 3(team0) entered blocking state [ 1454.996181][T15762] bridge0: port 3(team0) entered disabled state [ 1455.051741][T15762] device team0 entered promiscuous mode [ 1455.092324][T15762] device team_slave_0 entered promiscuous mode [ 1455.122733][T15762] device team_slave_1 entered promiscuous mode [ 1455.148234][T15762] bridge0: port 3(team0) entered blocking state [ 1455.154798][T15762] bridge0: port 3(team0) entered forwarding state 00:49:55 executing program 5: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x110, 0x4, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x800) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000004c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1, 0x2, {0xa, 0x4e24, 0x9, @empty, 0x2}}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000100)="a1e96881", 0x4}], 0x1, &(0x7f0000000780)=[{0x100, 0x10d, 0x10001, "2ac00652d29e4443afcedee58919cda4c398d82c9fd35146919410bee04a57475c4f7d39e14f4701f5b5bdfb3335bbe6d2d08f83c0137fd3ff68ae0e9b912dc27a39ba94a3673342bd2e2845d8f2d9eee0fdaf7149f68c5cabeeddee0f65e63c4b011e9f3c47d62bb6d358c786627d17da513379531cbffd86143c3531e3e1e6cef7de8b2a0c5440761e57e9ed696ba134a7afb75460d157ff83b5a30a88715e0d5a20d0d029e5ce23675f85a505616cc4cf88f7cfbadfa51db7dbe16169859d0c87042e486651bbb4e39857d9cdcd72567929476d730dff89719f308ff87e5b4d4c9b1bc6640549c523e07bc7"}, {0x90, 0x10d, 0x3, "e8a284fcecec6e01049c3d57d382ac06b0aaaee3088ced16c9f236cdeb6ad949d89f354053fa64750ccd74c306e81cc0134cd14559b8e3c660de89b6c592879d24b2c9d26453f3c39615b5ebcd3e81b8b57d134b7bea5757b9d6eeae6c418895155930dd3072f73dda0ac332532309793e2b59b598e069d9810077"}, {0x58, 0x1, 0x0, "4fceacf623ae97d49badd506f437384727d50bb26ce15e3a94926f28b4db0aea5a6c227776e5059b0681d5fc9525bf7db60861ee74c1835847229f87cf3eb4b546e89ebe"}, {0xc0, 0x10b, 0x7, "1fa92073fb8e647e6bfbf9736a19d921b3a3d1297bc38eb070099b3d1c4044abed291a64d6d5ff4c85af2118328713c3dcfcc59d00a5b7ec3d181bc6f8747cd6a7a83fcee41e5e3b87f90370140e45aacf61f3d67c8ffe3d792a5ed4084534d89aa1ac9ae38b283b0ebcbc5db6741c13a70f5e83402ce8abf43ca723a507a43138d7053c5c45683f11f0c7d1d10dc57b67fb68e644827add40810a86cb45e437156649409b0172e2efd1"}], 0x2a8}, 0x4) socketpair(0x0, 0x800, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x55, &(0x7f0000000240)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x600c884) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x1ff) sendmsg(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0)=@rc={0x1f, @fixed}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB="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"], 0x528}, 0x20000080) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001680)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000000)="18a011442443104b9a", 0x9}, {&(0x7f0000000640)="f8b17e779a2dc5621524b730ba3a7de36d73a5e7fb63fb87e2346df8360053c0b7050561a6d9aaf5c44d4f7e8002a7f1a31ca5edd033feb8b99f138e3c7bb70ea1b4fb316d6b82d51374f7d2964aba62d3320033863518", 0x57}, {&(0x7f0000000c00)="11cba61a478c88f17cfc454f8eef8f13ac1e35483e08198e49f87fe1e8fa60639b789219ce6b813e13d686eca9b9e18df2", 0x31}, {&(0x7f0000000cc0)="b164fdf2ad7d374535cfb10a11ce0d25fb78f440a942e56516b2f1e82e16", 0x1e}], 0x4, &(0x7f0000000a40)=[{0x30, 0x113, 0x0, "fef8aab04e42cd76618f8ddbc6fc23c5d840e5f1ce4213bcceea"}, {0x90, 0x0, 0xfff, "1b24f5bcd6fbe0a2db770fd13058ff1498cb16f4113a9f69037c9d01c62f8b3e7f66bd55a41e7243e234b308cb4d6334c63e5de94d9d7156d3d8f7684ff7da62874836fcf924e206f5013992fef7e69cc580c5a098804dcbc26e95547d38220268e76240da41ba27b185d095636020a8bbe7763562c02a749bfbeaba92"}, {0xe8, 0x0, 0x10000, "9b307db64666c216f75e922afdbd57a710c10f05df47592e0027067b816eccc16bfd26c997be733dd013473cbefb6dc37566b5762add56baf6e413fb1c0bea8d387035754d6684296644c1628c3244666e7d38c2b140bc51771f8923e9f17eaaa61b63a3a76953b354acd138cfa4d225d9d15f34d24677822a118d049f9e65d06ad6b39e2932ba8cd6ce26e571a2f2c68b4b9c7f3f65a7ac5c8f579907f952423d56f134dd135a1e90e1547cda27e3e642cac8c058b2d108747b0b38612fdac78b1c590f65f6a7a4c192b9b7233505479c772c9656"}], 0x1a8}, 0xc) openat$cgroup_ro(r1, &(0x7f0000000580)='cpuacct.stat\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000003ec0)={&(0x7f0000003e80)='./file0\x00', 0x0, 0x38}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='rxrpc_rx_discard_ack\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(r0, &(0x7f0000000f40)={&(0x7f0000000280)=@generic={0x2a, "a59d07dee749afe12c417b93592ab8adbd051d4321806ae521401174bd6fb3c06e0ca3e31922254872ac68f0195823546b2610a6983e870e8774de2aff6f0adba3c407da0a87e3008c1be87c221d41a8656a1ea46561157c56fe0314c25d8e571ad502efdd0712473552d783239e42a9e7a52ccd0ee99ef013e92060a6f8"}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000006c0)="0c7924b5941c6f79b38f131782aecf429fdf8505b52c34f3eba85b0cca1b14bd0b8c057b01fbf0d7de77654ca586719e4e19778d9292a2687e3503e6f35ecba8374f16f00d02681a6f630c742da03a878d8fdbad008634", 0x57}, {&(0x7f0000000d00)="4148525ad16e15a7af63bd6102678767103a881127891377ee47d9e08eeb038bb5b2a1a43df9902a4c0c3c2d87974aeb5801ff7168044a22550ffa77029358cc7b8d869dfa71a008140adc981e157bff719a71f4064aa2a6879659ace6e3e2e8", 0x60}, {&(0x7f0000000d80)="d33f7ca19251dafbc19954dce40c2a5ce4306a9f5b5995879a9ccb3d39aa91e9134dacd539ab35ce77792adcb7b77f00c84f285c57724a526b20e766bb4758e779274935e5affae31457f96bfbfc73b103407bcfa6a7ea17aa4027aa6dc990fbf02174299a42808d9860a2ec21a9afcd8220191eb165b071c64840555f790c3d48a2168c1e4d76454b31b6f6bab1baf59513c7d9a5ba99c620765fec05aec7d600d33bbb14c5f43747b7", 0xaa}, {&(0x7f0000000740)}], 0x4, &(0x7f0000000e40)=[{0xd0, 0x10e, 0x3, "af4f42a1a071819359d64139442a6496a5831d22e251d01717f5c51ebb7a4a880a0a66fd64158181688adfac82146165f177057bdea4b4866e2abcce804d2bb9c8ae69fea9440ef0f72d605f1401cf63cbd0c1a3dab2fb119ce469ee5497273472adcff9ec0e51e90b3bc1c8162f2468f2584eee3090ce56a390560e88eee74c6b78ee0c6c33417f7cbabdfed41101bfdf9cc40e8acde1746cbd8157f282f9da05d816750b1a86568aa8763393bd4ac7af72f6650ec6da8ab0bfd78b"}], 0xd0}, 0x1) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0xfe, 0x2, 0x45, 0xf8, 0x0, 0x8, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3ff, 0x1, @perf_config_ext={0x1e, 0x5}, 0x14004, 0x0, 0x0, 0x3, 0xffffffff, 0x83, 0x7fff, 0x0, 0xff, 0x0, 0x7f}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x0) [ 1455.262905][T15775] bpf: Bad value for 'mode' [ 1455.277688][ T37] kauditd_printk_skb: 3 callbacks suppressed [ 1455.277705][ T37] audit: type=1804 audit(1632703795.331:636): pid=15785 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2336/memory.events" dev="sda1" ino=14709 res=1 errno=0 00:49:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:49:55 executing program 0: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000380)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/124, 0x7c}, {&(0x7f0000000580)=""/214, 0xd6}, {&(0x7f0000000680)=""/179, 0xb3}, {&(0x7f0000000740)=""/236, 0xec}, {&(0x7f0000000840)=""/191, 0xbf}, {&(0x7f0000000280)=""/51, 0x33}, {&(0x7f0000000900)=""/214, 0xd6}, {&(0x7f0000000a00)=""/89, 0x59}], 0x9, &(0x7f0000000b40)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x58}, 0x12062) openat$cgroup_ro(r0, &(0x7f0000000c00)='cpu.stat\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000020000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='ext4_mark_inode_dirty\x00', r2}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r3, &(0x7f0000000000), 0x20b000) r4 = perf_event_open$cgroup(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x4, 0xff, 0x5, 0x0, 0x8, 0x8400, 0xa, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000040)}, 0x4000, 0x0, 0xffffffff, 0x7, 0x7, 0x9, 0xff, 0x0, 0x9, 0x0, 0x1}, r1, 0xc, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) 00:49:55 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0xc00000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) [ 1455.494154][ T37] audit: type=1804 audit(1632703795.541:637): pid=15785 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2336/memory.events" dev="sda1" ino=14709 res=1 errno=0 [ 1455.510552][T15791] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 00:49:55 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1455.660333][T15791] device team0 left promiscuous mode [ 1455.695327][T15791] device team_slave_0 left promiscuous mode 00:49:55 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000004000040000000000032500009500000000000000d387777ab82499fd7a38de0cd88b09fd1d80585afff33091b533c720577af017450b2a886733ceb617f121d79e3628e72be0d39e77dcb16887214f541bb89938c19978ea22254c58d75439a1edfee2adfeaffc2d14ffab3ddc1dc20efe6f457c3913f273d7b48d10b9904fda943414bf2f1c68c4878937c8f83a5203d5b63a2689bccccbd486e66c4a5e053d3a9db4238ee52d47e704465a6a9726ba058bd85acc9322902c0200e50faf989fd44b66da1b795d04df0d9bfd21a6608880516f25136a81d6b48d5f205d0d44bfabd7013f8192a3028ad96441ba7db2c3e80f0dbf59164e8806259d3b7633f704b15c3dc9259fa3aa3106e4821a620600000000000000904c8af7cd704f4afa93fc61d6ba0e2148b09a28cd376bc43a1445c635c73a6bd9cda98b27f9981f6af46d74e057515bef88b90f987de14f2a9e1b07dd8b865715f25a4f95cc0024e18e96570000f70b24cee055e19cdab1a31b2f0fb51e0d9348aa80e2e60cd60800000088b06a13d14f14e829e4330e4475096c886864c5bf8be6441e7e24a4162d88a668b65bc80a10d3357cd62db832a98c116b0000d92a6dabe73e52fd78db326416f055e4f531abb858e1a4ee680c94407e1ee01d68139635ab636723848d90a40d2a2298b5cb3cbe8366b09957fc5ee5472fb7671f1b99a7b0508949eaf27f8d356e321bb3ef7bfd1c951fe85603ff909878b9db38af432516700efc72e3847e1e86967d2a12a357a69a6cd73b73cfff08965818b338e5f5d20031bad9c612f6ea2861dd34e5be9aa536bd5b16857f8a07c834e3bcd414872719ba6e7c6936dd077c98e273537b833df0f0d1f75fb153292c2c8d93d7bede97270f771917308d5cedb3423b7f4f38cc671fcfe429d71e08440ca5f3f81930d17ed7058da07ca3460a1b5877fe36b2a65627b305aa874fb59caa32aef136326076e22f7661c916d0215a6c6b6b140ed86a97ab7721f1eb189c42936336dfa1f0df027c67b668f2a0a3b4e213423caaa03eb17c943a912122013f16ca05cc2a99"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) [ 1455.811395][T15791] device team_slave_1 left promiscuous mode [ 1455.897343][T15791] bridge0: port 3(team0) entered disabled state [ 1456.150747][T15792] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1456.206549][T15792] bridge0: port 3(team0) entered blocking state 00:49:56 executing program 0: socket$kcm(0x2b, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000001780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x1}], 0x1, 0x0, 0x0, 0x40020a00}, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480ef43b000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) recvmsg(r1, &(0x7f0000001e80)={&(0x7f0000001bc0)=@can, 0x80, &(0x7f0000001e40)=[{&(0x7f0000001c40)=""/128, 0x80}, {0x0}], 0x2, &(0x7f0000001f80)=""/218, 0xda}, 0x2003) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000002100)={0xffffffffffffffff, 0x10, &(0x7f00000020c0)={0x0}}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100), 0x6e, &(0x7f0000001800)=[{&(0x7f0000000040)=""/45, 0x2d}, {&(0x7f0000000200)=""/52, 0x34}, {0x0}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f0000000240)=""/12, 0xc}, {&(0x7f00000015c0)=""/119, 0x77}, {0x0}], 0x7, &(0x7f00000018c0)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xd8}, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001c00)={&(0x7f0000001a80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x50, 0x50, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x5, 0x64f6}}, @restrict={0x8, 0x0, 0x0, 0xb, 0x2}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x2, 0x5}]}, @restrict={0xd, 0x0, 0x0, 0xb, 0x4}, @typedef={0x0, 0x0, 0x0, 0x8, 0x5}]}, {0x0, [0x71, 0x30, 0x5f]}}, &(0x7f0000001b40)=""/169, 0x6d, 0xa9}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001e00)={r2, 0x10, &(0x7f0000001dc0)={&(0x7f0000001cc0)=""/243, 0xf3, 0x0}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001ec0)={0x1a, 0x7, &(0x7f0000001a00)=@raw=[@call={0x85, 0x0, 0x0, 0x7c}, @exit, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, @exit, @call={0x85, 0x0, 0x0, 0x76}], &(0x7f0000001a40)='GPL\x00', 0x4, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x21, r3, 0x8, &(0x7f0000001c40)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000001c80)={0x5, 0x0, 0x8001, 0x2}, 0x10, r4, r5}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r4, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 1456.250202][ T37] audit: type=1804 audit(1632703796.301:638): pid=15810 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2337/memory.events" dev="sda1" ino=13907 res=1 errno=0 [ 1456.283773][T15792] bridge0: port 3(team0) entered disabled state 00:49:56 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1456.349404][T15792] device team0 entered promiscuous mode [ 1456.420978][T15792] device team_slave_0 entered promiscuous mode 00:49:56 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:49:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0xd00000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) [ 1456.485808][ T37] audit: type=1804 audit(1632703796.531:639): pid=15810 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2337/memory.events" dev="sda1" ino=13907 res=1 errno=0 [ 1456.487303][T15792] device team_slave_1 entered promiscuous mode 00:49:56 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) [ 1456.690377][T15792] bridge0: port 3(team0) entered blocking state [ 1456.696806][T15792] bridge0: port 3(team0) entered forwarding state [ 1456.721421][T15814] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 00:49:56 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1456.940325][ T37] audit: type=1804 audit(1632703796.991:640): pid=15825 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2338/memory.events" dev="sda1" ino=14700 res=1 errno=0 [ 1456.969878][T15814] team0: Device ipvlan0 failed to register rx_handler [ 1457.310694][ T37] audit: type=1804 audit(1632703797.301:641): pid=15828 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2338/memory.events" dev="sda1" ino=14700 res=1 errno=0 00:49:57 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0xd01000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:49:57 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:49:57 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:49:57 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:49:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000700)='ns/time_for_children\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0x1}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x20000000, 0x0, 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000280)='./file0/file1\x00', r0}, 0x10) recvmsg$unix(0xffffffffffffffff, 0x0, 0x41) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000180), 0x6e, &(0x7f00000002c0)=[{0x0}], 0x1}, 0x40000043) mount$bpf(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f0000000800), 0x280302d, &(0x7f0000000cc0)=ANY=[]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000440)=@ipx={0x4, 0x7, 0x7, "92fce768b21e", 0x1}, 0x80, 0x0}, 0x20000041) r1 = socket$kcm(0x2, 0x3, 0x3) sendmsg$sock(r1, &(0x7f0000000340)={&(0x7f00000000c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000180)=[@mark={{0x14}}], 0x18}, 0x0) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f00000004c0)=@in6={0xa, 0x4e22, 0x5, @mcast1, 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000300)="3cc146e7c9cfab476d13f40efb54209f8e00c9df25ad2493b9019cc04286558203d62fe93231", 0x26}, {&(0x7f0000000540)="e594b75bc874611284730b4696547590", 0x10}, {&(0x7f0000000640)="a864c23a0058efcf63c7611e4db36355f3b933989a3c8377266733aaeeaa49909c142a7a40deb6453e999de6922d514d196ede9259f59b47e85feb2f9da7b651de0998d6fa433b791c287d351b2821fed7371f0bbc09958c77f1ea676e00532f79a1d6de05d35523b998f99aa6b2b99f1fcdaa4f9ef58bffc32051d9e5a9a4cb382ca15c1b41164bf9f230acecf32f00697a1607b539076cf1afa968550164c181f290dfe765757f97a3dd4bf4f020fa7d5ff7b94526f8", 0xb7}], 0x3}, 0x800) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140), 0x801, &(0x7f0000000740)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303030352caa3172af6d6f64653d303030303030303030303030a7593030303030303430302c6f626a5f747970653d237d2a262d292c2e5e7d2a372c00"]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) mkdir(&(0x7f0000000200)='./file0/file1\x00', 0x50) mount$bpf(0x0, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x20002, &(0x7f0000000340)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303037372c6f626a5f726f6c653d002c7065001000005f646972656374696f2c00"]) 00:49:58 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1457.976837][ T37] audit: type=1804 audit(1632703798.031:642): pid=15847 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2339/memory.events" dev="sda1" ino=14713 res=1 errno=0 [ 1458.217469][ T37] audit: type=1804 audit(1632703798.191:643): pid=15847 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2339/memory.events" dev="sda1" ino=14713 res=1 errno=0 [ 1459.883444][T15834] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1459.894441][T15834] team0: Device ipvlan0 failed to register rx_handler 00:50:00 executing program 0: socket$kcm(0x2b, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000001780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x1}], 0x1, 0x0, 0x0, 0x40020a00}, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480ef43b000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) recvmsg(r1, &(0x7f0000001e80)={&(0x7f0000001bc0)=@can, 0x80, &(0x7f0000001e40)=[{&(0x7f0000001c40)=""/128, 0x80}, {0x0}], 0x2, &(0x7f0000001f80)=""/218, 0xda}, 0x2003) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000002100)={0xffffffffffffffff, 0x10, &(0x7f00000020c0)={0x0}}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100), 0x6e, &(0x7f0000001800)=[{&(0x7f0000000040)=""/45, 0x2d}, {&(0x7f0000000200)=""/52, 0x34}, {0x0}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f0000000240)=""/12, 0xc}, {&(0x7f00000015c0)=""/119, 0x77}, {0x0}], 0x7, &(0x7f00000018c0)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xd8}, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001c00)={&(0x7f0000001a80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x50, 0x50, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x5, 0x64f6}}, @restrict={0x8, 0x0, 0x0, 0xb, 0x2}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x2, 0x5}]}, @restrict={0xd, 0x0, 0x0, 0xb, 0x4}, @typedef={0x0, 0x0, 0x0, 0x8, 0x5}]}, {0x0, [0x71, 0x30, 0x5f]}}, &(0x7f0000001b40)=""/169, 0x6d, 0xa9}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001e00)={r2, 0x10, &(0x7f0000001dc0)={&(0x7f0000001cc0)=""/243, 0xf3, 0x0}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001ec0)={0x1a, 0x7, &(0x7f0000001a00)=@raw=[@call={0x85, 0x0, 0x0, 0x7c}, @exit, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, @exit, @call={0x85, 0x0, 0x0, 0x76}], &(0x7f0000001a40)='GPL\x00', 0x4, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x21, r3, 0x8, &(0x7f0000001c40)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000001c80)={0x5, 0x0, 0x8001, 0x2}, 0x10, r4, r5}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r4, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:50:00 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000500)='ext4_mballoc_alloc\x00', r1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2d2, &(0x7f0000000540)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x39, 0x7, 0x0, 0x0, 0x1, 0x0, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}, 0x4, 0x400, 0x80000001, 0x8, 0x100, 0xc03, 0xfff, 0x0, 0x4, 0x0, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0x9) 00:50:00 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:50:00 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x81, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x44, 0x6}, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000516b00000000000000009500f5ffffff0000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) write$cgroup_type(r4, &(0x7f0000000180), 0x9) write$cgroup_subtree(r4, &(0x7f0000000380)={[{0x2d, 'pids'}, {0x2d, 'pids'}, {0x2b, 'memory'}, {0x2d, 'rdma'}, {0x0, 'memory'}]}, 0x22) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r3, 0x4) socket$kcm(0xa, 0x5, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000580), 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), 0x1, 0x9}, 0x48) [ 1460.439523][ T37] audit: type=1804 audit(1632703800.491:644): pid=15869 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2340/memory.events" dev="sda1" ino=14749 res=1 errno=0 00:50:00 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) openat$cgroup_ro(r0, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000600)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[], 0x1a) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='ext4_forget\x00'}, 0x10) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x4ea00) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10c}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001ec0)={0x1a, 0x7, &(0x7f0000001a00)=@raw=[@call={0x85, 0x0, 0x0, 0x7c}, @exit, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, @exit, @call={0x85, 0x0, 0x0, 0x76}], &(0x7f0000001a40)='GPL\x00', 0x4, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x21, 0xffffffffffffffff, 0x8, &(0x7f0000001c40)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000001c80)={0x5, 0x0, 0x8001, 0x2}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x2, &(0x7f0000000300)=@raw=[@alu={0x7, 0x0, 0xd, 0x1, 0x8, 0x108, 0x8}, @ldst={0x3, 0x3, 0x0, 0x9, 0x0, 0x50, 0xfffffffffffffff0}], &(0x7f0000000340)='syzkaller\x00', 0x200, 0x92, &(0x7f0000000380)=""/146, 0x40f00, 0x8718332c92cf6abc, '\x00', 0x0, 0xf, r1, 0x8, &(0x7f0000000440)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000480)={0x2, 0xf, 0x1, 0x5}, 0x10}, 0x78) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x4ea00) write$cgroup_subtree(r4, &(0x7f0000000540)={[{0x2d, 'rdma'}, {0x2b, 'cpu'}, {0x0, 'cpu'}, {0x2b, 'cpu'}, {0x2d, 'rdma'}, {0x2d, 'io'}, {0x2d, 'io'}, {0x2d, 'memory'}, {0x6, 'cpu'}, {0x2b, 'cpu'}]}, 0x35) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x44300001c) [ 1460.712373][ T37] audit: type=1804 audit(1632703800.751:645): pid=15869 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2340/memory.events" dev="sda1" ino=14749 res=1 errno=0 [ 1462.299536][T15871] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1462.319376][T15871] team0: Device ipvlan0 failed to register rx_handler [ 1463.767826][ T286] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1464.287059][ T286] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1464.878302][ T286] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1465.340683][ T286] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1467.594385][T15891] chnl_net:caif_netlink_parms(): no params data found [ 1467.761378][T15245] Bluetooth: hci3: command 0x0409 tx timeout [ 1468.020238][T15891] bridge0: port 1(bridge_slave_0) entered blocking state [ 1468.028421][T15891] bridge0: port 1(bridge_slave_0) entered disabled state [ 1468.040095][T15891] device bridge_slave_0 entered promiscuous mode [ 1468.050117][T15891] bridge0: port 2(bridge_slave_1) entered blocking state [ 1468.058303][T15891] bridge0: port 2(bridge_slave_1) entered disabled state [ 1468.066603][T15891] device bridge_slave_1 entered promiscuous mode [ 1468.452504][T15891] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1468.817780][T15891] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1468.859188][T15891] team0: Port device team_slave_0 added [ 1469.222125][T15891] team0: Port device team_slave_1 added [ 1469.254842][T15891] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1469.262470][T15891] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1469.291459][T15891] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1469.669372][T15891] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1469.677478][T15891] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1469.705565][T15891] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1469.841145][ T6990] Bluetooth: hci3: command 0x041b tx timeout [ 1470.113770][T15891] device hsr_slave_0 entered promiscuous mode [ 1470.120395][T15891] device hsr_slave_1 entered promiscuous mode [ 1470.129903][T15891] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1470.138208][T15891] Cannot create hsr debugfs directory [ 1471.036500][ T286] device hsr_slave_0 left promiscuous mode [ 1471.045402][ T286] device hsr_slave_1 left promiscuous mode [ 1471.053159][ T286] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1471.062422][ T286] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1471.071715][ T286] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1471.079212][ T286] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1471.088584][ T286] device bridge_slave_1 left promiscuous mode [ 1471.095335][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 1471.104359][ T286] device bridge_slave_0 left promiscuous mode [ 1471.111782][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 1471.124103][ T286] device veth1_macvtap left promiscuous mode [ 1471.130240][ T286] device veth0_macvtap left promiscuous mode [ 1471.137745][ T286] device veth1_vlan left promiscuous mode [ 1471.144891][ T286] device veth0_vlan left promiscuous mode [ 1471.921676][ T6990] Bluetooth: hci3: command 0x040f tx timeout [ 1473.668660][ T10] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 1474.000789][ T9541] Bluetooth: hci3: command 0x0419 tx timeout [ 1484.161320][ T3252] ieee802154 phy0 wpan0: encryption failed: -22 [ 1484.167759][ T3252] ieee802154 phy1 wpan1: encryption failed: -22 [ 1484.829215][ T151] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 1488.308755][ T286] team0 (unregistering): Port device team_slave_1 removed [ 1488.338765][ T286] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1488.356221][ T286] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1488.425572][ T286] bond0 (unregistering): Released all slaves [ 1488.546532][T15891] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1488.571162][T15888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1488.578930][T15888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1488.592504][T15891] 8021q: adding VLAN 0 to HW filter on device team0 [ 1488.614512][T15245] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1488.625302][T15245] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1488.635205][T15245] bridge0: port 1(bridge_slave_0) entered blocking state [ 1488.642318][T15245] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1488.660122][T15245] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1488.668229][T15245] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1488.677678][T15245] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1488.688591][T15245] bridge0: port 2(bridge_slave_1) entered blocking state [ 1488.695742][T15245] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1488.703925][T15245] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1488.720150][T15888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1488.731366][T15245] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1488.741525][T15245] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1488.753099][ T2947] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1488.762558][ T6990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1488.778167][ T6990] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1488.807844][T14622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1488.816826][T14622] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1488.830199][ T6693] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1488.838669][ T6693] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1488.853095][T15891] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1488.873716][ T6693] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1488.882989][ T6693] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1488.896593][T15891] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1489.042415][T10293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1489.060606][T10293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1489.086399][ T6693] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1489.095916][ T6693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1489.117530][T15891] device veth0_vlan entered promiscuous mode [ 1489.126919][T14622] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1489.138201][T14622] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1489.155025][T15891] device veth1_vlan entered promiscuous mode [ 1489.211356][T14622] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1489.219633][T14622] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1489.230954][T14622] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1489.241002][T14622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1489.253356][T15891] device veth0_macvtap entered promiscuous mode [ 1489.268691][T15891] device veth1_macvtap entered promiscuous mode [ 1489.294951][T15891] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1489.306185][T15891] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1489.317828][T15891] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1489.329353][T15891] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1489.341002][T15891] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1489.352490][T15891] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1489.363961][T15891] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1489.375530][T15891] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1489.389156][T15891] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1489.400698][T15891] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1489.412912][T15891] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1489.423884][ T6693] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1489.434564][ T6693] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1489.444526][ T6693] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1489.454266][ T6693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1489.467206][T15891] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1489.488194][T15891] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1489.509853][T15891] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1489.535132][T15891] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1489.548030][T15891] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1489.568056][T15891] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1489.578970][T15891] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1489.600388][T15891] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1489.621948][T15891] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1489.641640][T15891] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1489.653222][T15891] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1489.667520][T14622] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1489.688298][T14622] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1489.811901][ T10] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1489.820898][ T10] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1489.896529][T14622] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1489.931753][ T3926] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1489.962645][ T3926] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1489.985649][T10293] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 00:50:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0xe00000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:50:30 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000028640)={0x16, 0xa, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000000000c000000000000000183000000000000000003e0000000000040040000400000018200000", @ANYRES32=0x1, @ANYBLOB="0000000002000000936a0000120000009510000000000000"], 0x0, 0x7fffffff, 0x8c, &(0x7f0000000b00)=""/140, 0x41100, 0x4, '\x00', 0x0, 0x10, r0, 0x8, &(0x7f00000285c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000028600)={0x0, 0xd, 0x9}, 0x10, 0x0, r1}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='cgroup.controllers\x00', 0x0, 0x0) r3 = socket$kcm(0x2, 0x3, 0x3) socket$kcm(0x29, 0x2, 0x0) sendmsg$sock(r3, &(0x7f0000000340)={&(0x7f00000000c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000180)=[@mark={{0x14}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000028640)={0x0, 0xa, &(0x7f0000000540)=ANY=[@ANYRES32=r3, @ANYBLOB="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"], 0x0, 0x7fffffff, 0x8c, &(0x7f0000000b00)=""/140, 0x41100, 0x4, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000285c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000040)={0x200000, 0xd, 0x9}, 0x10, 0x0, r2}, 0x78) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x800100, 0x0, 0x0, 0x0, 0x7}, [@exit]}, &(0x7f0000000180)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x4, 0x5, 0x3, 0x4}, 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) close(r4) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) r5 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0), 0x161) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x99, 0x3e, 0x80, 0xb7, 0x0, 0xfffffffffffffffc, 0x80, 0x9, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000002c0), 0x1}, 0xa, 0x4, 0x9, 0x0, 0x4, 0xfffffcd5, 0x400, 0x0, 0x2, 0x0, 0xc17}, 0x0, 0xf, 0xffffffffffffffff, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000004c0)={r2}) recvmsg$kcm(r6, &(0x7f0000000900)={&(0x7f0000000800)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000bc0)=""/4096, 0x1000}], 0x1, &(0x7f00000008c0)}, 0x10020) 00:50:30 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000004000040000000000032500009500000000000000d387777ab82499fd7a38de0cd88b09fd1d80585afff33091b533c720577af017450b2a886733ceb617f121d79e3628e72be0d39e77dcb16887214f541bb89938c19978ea22254c58d75439a1edfee2adfeaffc2d14ffab3ddc1dc20efe6f457c3913f273d7b48d10b9904fda943414bf2f1c68c4878937c8f83a5203d5b63a2689bccccbd486e66c4a5e053d3a9db4238ee52d47e704465a6a9726ba058bd85acc9322902c0200e50faf989fd44b66da1b795d04df0d9bfd21a6608880516f25136a81d6b48d5f205d0d44bfabd7013f8192a3028ad96441ba7db2c3e80f0dbf59164e8806259d3b7633f704b15c3dc9259fa3aa3106e4821a620600000000000000904c8af7cd704f4afa93fc61d6ba0e2148b09a28cd376bc43a1445c635c73a6bd9cda98b27f9981f6af46d74e057515bef88b90f987de14f2a9e1b07dd8b865715f25a4f95cc0024e18e96570000f70b24cee055e19cdab1a31b2f0fb51e0d9348aa80e2e60cd60800000088b06a13d14f14e829e4330e4475096c886864c5bf8be6441e7e24a4162d88a668b65bc80a10d3357cd62db832a98c116b0000d92a6dabe73e52fd78db326416f055e4f531abb858e1a4ee680c94407e1ee01d68139635ab636723848d90a40d2a2298b5cb3cbe8366b09957fc5ee5472fb7671f1b99a7b0508949eaf27f8d356e321bb3ef7bfd1c951fe85603ff909878b9db38af432516700efc72e3847e1e86967d2a12a357a69a6cd73b73cfff08965818b338e5f5d20031bad9c612f6ea2861dd34e5be9aa536bd5b16857f8a07c834e3bcd414872719ba6e7c6936dd077c98e273537b833df0f0d1f75fb153292c2c8d93d7bede97270f771917308d5cedb3423b7f4f38cc671fcfe429d71e08440ca5f3f81930d17ed7058da07ca3460a1b5877fe36b2a65627b305aa874fb59caa32aef136326076e22f7661c916d0215a6c6b6b140ed86a97ab7721f1eb189c42936336dfa1f0df027c67b668f2a0a3b4e213423caaa03eb17c943a912122013f16ca05cc2a99"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:50:30 executing program 5: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000000c0), 0x10) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x6, 0xd, 0xad, 0x0, 0x100, 0x51000, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0xd74b, 0x2}, 0x10, 0x100000000, 0x1ff, 0x7, 0x3, 0x0, 0x6, 0x0, 0x1, 0x0, 0x3}, 0x0, 0x7, r1, 0x2) r2 = socket$kcm(0xa, 0x2, 0x11) close(r0) recvmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 00:50:30 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)='syzkaller\x00', 0x5, 0xc3, &(0x7f0000000300)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xffffffff}, 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x78) [ 1490.521349][ T37] audit: type=1804 audit(1632703830.583:646): pid=16289 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2341/memory.events" dev="sda1" ino=14766 res=1 errno=0 00:50:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @perf_config_ext={0x1, 0x8001}, 0x360, 0x1, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002200055bd25a80648c63940d1124fc60100010400a000a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@pppoe={0x18, 0x0, {0x2, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x40}, 'vlan1\x00'}}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000140)="ae26044dcf82d0c31a6821c869b434a9dabb702880ce", 0x16}], 0x1, &(0x7f00000001c0)=[{0x48, 0x100, 0x5, "e4d61630851a3e288c0f3e8bc7055957889f8671d7e8dc426631eaa1580b5b2456bbd48595b353d4688538ac2685b77ad15039"}], 0x48}, 0x8000) r1 = socket$kcm(0x29, 0x0, 0x0) r2 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(r2, 0x107, 0x8, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000002a00)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r2, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}], 0x2}, 0x8805) mount$bpf(0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000000900)={&(0x7f0000000340)={0x2, 0x4e22, @multicast2}, 0x10, 0x0}, 0x40040) bpf$PROG_LOAD(0x5, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x8}, 0x10}, 0x78) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) sendmsg$kcm(r1, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000800)=[{0x0}, {&(0x7f0000000740)="8e0eedcfef0d6de1a182507af34cd2ff65fbe938853149f9f8b860ec106a04f9817e7435ca887a896d31c41107d9461126d7f00c17fc08a29b57009d29df4895938fcbdcfbc16b8d2e40cb91f33a058b1be1363826eb43e19e9134c18deae7baa915", 0x62}], 0x2}, 0x1c840) [ 1490.823484][ T37] audit: type=1804 audit(1632703830.823:647): pid=16289 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2341/memory.events" dev="sda1" ino=14766 res=1 errno=0 00:50:31 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0xe01000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:50:31 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:50:31 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:31 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1491.609968][ T37] audit: type=1804 audit(1632703831.663:648): pid=16325 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2342/memory.events" dev="sda1" ino=14745 res=1 errno=0 00:50:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0xf00000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) [ 1491.782278][ T37] audit: type=1804 audit(1632703831.753:649): pid=16325 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2342/memory.events" dev="sda1" ino=14745 res=1 errno=0 00:50:33 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000028640)={0x16, 0xa, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000000000c000000000000000183000000000000000003e0000000000040040000400000018200000", @ANYRES32=0x1, @ANYBLOB="0000000002000000936a0000120000009510000000000000"], 0x0, 0x7fffffff, 0x8c, &(0x7f0000000b00)=""/140, 0x41100, 0x4, '\x00', 0x0, 0x10, r0, 0x8, &(0x7f00000285c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000028600)={0x0, 0xd, 0x9}, 0x10, 0x0, r1}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='cgroup.controllers\x00', 0x0, 0x0) r3 = socket$kcm(0x2, 0x3, 0x3) socket$kcm(0x29, 0x2, 0x0) sendmsg$sock(r3, &(0x7f0000000340)={&(0x7f00000000c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000180)=[@mark={{0x14}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000028640)={0x0, 0xa, &(0x7f0000000540)=ANY=[@ANYRES32=r3, @ANYBLOB="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"], 0x0, 0x7fffffff, 0x8c, &(0x7f0000000b00)=""/140, 0x41100, 0x4, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000285c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000040)={0x200000, 0xd, 0x9}, 0x10, 0x0, r2}, 0x78) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x800100, 0x0, 0x0, 0x0, 0x7}, [@exit]}, &(0x7f0000000180)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x4, 0x5, 0x3, 0x4}, 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) close(r4) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) r5 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0), 0x161) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x99, 0x3e, 0x80, 0xb7, 0x0, 0xfffffffffffffffc, 0x80, 0x9, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000002c0), 0x1}, 0xa, 0x4, 0x9, 0x0, 0x4, 0xfffffcd5, 0x400, 0x0, 0x2, 0x0, 0xc17}, 0x0, 0xf, 0xffffffffffffffff, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000004c0)={r2}) recvmsg$kcm(r6, &(0x7f0000000900)={&(0x7f0000000800)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000bc0)=""/4096, 0x1000}], 0x1, &(0x7f00000008c0)}, 0x10020) 00:50:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x1000000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:50:33 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:50:33 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1493.317289][ T37] audit: type=1804 audit(1632703833.373:650): pid=16353 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2343/memory.events" dev="sda1" ino=14785 res=1 errno=0 [ 1493.578795][ T37] audit: type=1804 audit(1632703833.633:651): pid=16353 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2343/memory.events" dev="sda1" ino=14785 res=1 errno=0 [ 1494.096523][ T37] audit: type=1800 audit(1632703834.153:652): pid=16353 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="memory.events" dev="sda1" ino=14785 res=0 errno=0 [ 1497.226990][T16372] chnl_net:caif_netlink_parms(): no params data found [ 1497.331032][T16372] bridge0: port 1(bridge_slave_0) entered blocking state [ 1497.338271][T16372] bridge0: port 1(bridge_slave_0) entered disabled state [ 1497.347742][T16372] device bridge_slave_0 entered promiscuous mode [ 1497.358295][T16372] bridge0: port 2(bridge_slave_1) entered blocking state [ 1497.366093][T16372] bridge0: port 2(bridge_slave_1) entered disabled state [ 1497.375841][T16372] device bridge_slave_1 entered promiscuous mode [ 1497.406594][T16372] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1497.420722][T16372] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1497.463606][T16372] team0: Port device team_slave_0 added [ 1497.472061][T16372] team0: Port device team_slave_1 added [ 1497.509593][T16372] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1497.516564][T16372] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1497.543428][T16372] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1497.557079][T16372] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1497.567067][T16372] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1497.593553][T16372] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1497.637264][T16372] device hsr_slave_0 entered promiscuous mode [ 1497.645716][T16372] device hsr_slave_1 entered promiscuous mode [ 1497.652787][T16372] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1497.661354][T16372] Cannot create hsr debugfs directory [ 1497.781780][T16372] bridge0: port 2(bridge_slave_1) entered blocking state [ 1497.788995][T16372] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1497.796505][T16372] bridge0: port 1(bridge_slave_0) entered blocking state [ 1497.803659][T16372] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1497.866381][T16372] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1497.883191][ T2947] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1497.891651][ T2947] bridge0: port 1(bridge_slave_0) entered disabled state [ 1497.901166][ T2947] bridge0: port 2(bridge_slave_1) entered disabled state [ 1497.910108][ T2947] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1497.928978][T16372] 8021q: adding VLAN 0 to HW filter on device team0 [ 1497.942321][T15888] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1497.951010][T15888] bridge0: port 1(bridge_slave_0) entered blocking state [ 1497.958077][T15888] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1497.973629][T14622] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1497.982765][T14622] bridge0: port 2(bridge_slave_1) entered blocking state [ 1497.989888][T14622] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1498.016080][T10293] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1498.038737][T10293] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1498.046826][T10293] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1498.056584][T10293] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1498.065844][T10293] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1498.078891][T16372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1498.106574][T16372] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1498.116425][T10293] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1498.125244][T10293] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1498.203052][ T2947] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1498.223803][T10293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1498.232059][T10293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1498.241445][T10293] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1498.251373][T10293] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1498.263637][T16372] device veth0_vlan entered promiscuous mode [ 1498.278202][T16372] device veth1_vlan entered promiscuous mode [ 1498.305546][T10293] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1498.315168][T10293] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1498.324233][T10293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1498.333189][T10293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1498.345395][T16372] device veth0_macvtap entered promiscuous mode [ 1498.365666][T16372] device veth1_macvtap entered promiscuous mode [ 1498.386005][T16372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1498.396822][T16372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1498.409426][T16372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1498.420909][T16372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1498.431703][T16372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1498.443385][T16372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1498.455045][T16372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1498.466297][T16372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1498.478223][T16372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1498.490553][T16372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1498.501284][T16372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1498.512395][T16372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1498.524857][T16372] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1498.534077][ T2947] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1498.542943][ T2947] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1498.555367][ T2947] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1498.564545][ T2947] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1498.580269][T16372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1498.590868][T16372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1498.602233][T16372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1498.613215][T16372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1498.623492][T16372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1498.635106][T16372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1498.646541][T16372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1498.658381][T16372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1498.668654][T16372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1498.679679][T16372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1498.691306][T16372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1498.701899][T16372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1498.713218][T16372] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1498.724227][T14622] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1498.733301][T14622] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1498.833070][ T185] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1498.842158][ T185] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1498.890633][T14622] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1498.920055][ T3926] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1498.928290][ T3926] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1498.940129][T14622] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1499.052537][ T6990] Bluetooth: hci0: command 0x0409 tx timeout [ 1499.063285][T16717] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1499.073232][T16717] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1499.086966][T16717] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.0'. 00:50:39 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x1100000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:50:39 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:39 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:39 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) [ 1499.127816][T16720] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1499.137368][T16720] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1499.146750][T16720] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1499.340807][ T37] audit: type=1804 audit(1632703839.404:653): pid=16729 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2344/memory.events" dev="sda1" ino=14817 res=1 errno=0 00:50:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:39 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1499.726348][ T37] audit: type=1804 audit(1632703839.774:654): pid=16729 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2344/memory.events" dev="sda1" ino=14817 res=1 errno=0 00:50:39 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x1200000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:50:39 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:40 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:50:40 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:40 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:40 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x1300000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) [ 1500.530141][ T37] audit: type=1804 audit(1632703840.594:655): pid=16758 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2345/memory.events" dev="sda1" ino=13861 res=1 errno=0 00:50:40 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1500.697458][ T37] audit: type=1804 audit(1632703840.744:656): pid=16759 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2345/memory.events" dev="sda1" ino=13861 res=1 errno=0 00:50:40 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000004000040000000000032500009500000000000000d387777ab82499fd7a38de0cd88b09fd1d80585afff33091b533c720577af017450b2a886733ceb617f121d79e3628e72be0d39e77dcb16887214f541bb89938c19978ea22254c58d75439a1edfee2adfeaffc2d14ffab3ddc1dc20efe6f457c3913f273d7b48d10b9904fda943414bf2f1c68c4878937c8f83a5203d5b63a2689bccccbd486e66c4a5e053d3a9db4238ee52d47e704465a6a9726ba058bd85acc9322902c0200e50faf989fd44b66da1b795d04df0d9bfd21a6608880516f25136a81d6b48d5f205d0d44bfabd7013f8192a3028ad96441ba7db2c3e80f0dbf59164e8806259d3b7633f704b15c3dc9259fa3aa3106e4821a620600000000000000904c8af7cd704f4afa93fc61d6ba0e2148b09a28cd376bc43a1445c635c73a6bd9cda98b27f9981f6af46d74e057515bef88b90f987de14f2a9e1b07dd8b865715f25a4f95cc0024e18e96570000f70b24cee055e19cdab1a31b2f0fb51e0d9348aa80e2e60cd60800000088b06a13d14f14e829e4330e4475096c886864c5bf8be6441e7e24a4162d88a668b65bc80a10d3357cd62db832a98c116b0000d92a6dabe73e52fd78db326416f055e4f531abb858e1a4ee680c94407e1ee01d68139635ab636723848d90a40d2a2298b5cb3cbe8366b09957fc5ee5472fb7671f1b99a7b0508949eaf27f8d356e321bb3ef7bfd1c951fe85603ff909878b9db38af432516700efc72e3847e1e86967d2a12a357a69a6cd73b73cfff08965818b338e5f5d20031bad9c612f6ea2861dd34e5be9aa536bd5b16857f8a07c834e3bcd414872719ba6e7c6936dd077c98e273537b833df0f0d1f75fb153292c2c8d93d7bede97270f771917308d5cedb3423b7f4f38cc671fcfe429d71e08440ca5f3f81930d17ed7058da07ca3460a1b5877fe36b2a65627b305aa874fb59caa32aef136326076e22f7661c916d0215a6c6b6b140ed86a97ab7721f1eb189c42936336dfa1f0df027c67b668f2a0a3b4e213423caaa03eb17c943a912122013f16ca05cc2a99"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:50:41 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:41 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x1400000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) [ 1501.129058][T10293] Bluetooth: hci0: command 0x041b tx timeout 00:50:41 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:41 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1501.201661][ T37] audit: type=1804 audit(1632703841.264:657): pid=16778 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2346/memory.events" dev="sda1" ino=14830 res=1 errno=0 [ 1501.501989][ T37] audit: type=1804 audit(1632703841.444:658): pid=16778 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2346/memory.events" dev="sda1" ino=14830 res=1 errno=0 00:50:41 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:42 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:50:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x1500000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:50:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1502.253258][ T37] audit: type=1804 audit(1632703842.314:659): pid=16803 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2347/memory.events" dev="sda1" ino=14842 res=1 errno=0 00:50:42 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1502.486425][ T37] audit: type=1804 audit(1632703842.514:660): pid=16803 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2347/memory.events" dev="sda1" ino=14842 res=1 errno=0 00:50:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x1600000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:50:42 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:50:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x1700000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) [ 1503.199616][ T6990] Bluetooth: hci0: command 0x040f tx timeout [ 1503.207351][ T37] audit: type=1804 audit(1632703843.264:661): pid=16826 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2348/memory.events" dev="sda1" ino=14859 res=1 errno=0 00:50:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) [ 1503.527351][ T37] audit: type=1804 audit(1632703843.584:662): pid=16826 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2348/memory.events" dev="sda1" ino=14859 res=1 errno=0 00:50:44 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:44 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:44 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:44 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:50:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) [ 1504.534033][ T37] kauditd_printk_skb: 1 callbacks suppressed [ 1504.534050][ T37] audit: type=1804 audit(1632703844.584:664): pid=16840 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2349/memory.events" dev="sda1" ino=14832 res=1 errno=0 [ 1504.600408][ T185] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) 00:50:44 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x1800000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:50:45 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:50:45 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) 00:50:45 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1505.288892][T10293] Bluetooth: hci0: command 0x0419 tx timeout 00:50:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x1900000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) [ 1505.405990][ T37] audit: type=1804 audit(1632703845.464:665): pid=16865 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2350/memory.events" dev="sda1" ino=14795 res=1 errno=0 [ 1505.595246][ T37] audit: type=1804 audit(1632703845.634:666): pid=16865 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2350/memory.events" dev="sda1" ino=14795 res=1 errno=0 00:50:45 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) 00:50:45 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:46 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:50:46 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) 00:50:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x1a00000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) [ 1506.307177][ T37] audit: type=1804 audit(1632703846.364:667): pid=16894 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2351/memory.events" dev="sda1" ino=14577 res=1 errno=0 [ 1506.554341][ T37] audit: type=1804 audit(1632703846.554:668): pid=16894 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2351/memory.events" dev="sda1" ino=14577 res=1 errno=0 00:50:46 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) 00:50:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:50:47 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x1b00000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:50:47 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:47 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1507.226051][ T37] audit: type=1804 audit(1632703847.284:669): pid=16910 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2352/memory.events" dev="sda1" ino=13861 res=1 errno=0 [ 1507.457456][ T37] audit: type=1804 audit(1632703847.434:670): pid=16910 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2352/memory.events" dev="sda1" ino=13861 res=1 errno=0 00:50:47 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x1c00000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:50:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000004000040000000000032500009500000000000000d387777ab82499fd7a38de0cd88b09fd1d80585afff33091b533c720577af017450b2a886733ceb617f121d79e3628e72be0d39e77dcb16887214f541bb89938c19978ea22254c58d75439a1edfee2adfeaffc2d14ffab3ddc1dc20efe6f457c3913f273d7b48d10b9904fda943414bf2f1c68c4878937c8f83a5203d5b63a2689bccccbd486e66c4a5e053d3a9db4238ee52d47e704465a6a9726ba058bd85acc9322902c0200e50faf989fd44b66da1b795d04df0d9bfd21a6608880516f25136a81d6b48d5f205d0d44bfabd7013f8192a3028ad96441ba7db2c3e80f0dbf59164e8806259d3b7633f704b15c3dc9259fa3aa3106e4821a620600000000000000904c8af7cd704f4afa93fc61d6ba0e2148b09a28cd376bc43a1445c635c73a6bd9cda98b27f9981f6af46d74e057515bef88b90f987de14f2a9e1b07dd8b865715f25a4f95cc0024e18e96570000f70b24cee055e19cdab1a31b2f0fb51e0d9348aa80e2e60cd60800000088b06a13d14f14e829e4330e4475096c886864c5bf8be6441e7e24a4162d88a668b65bc80a10d3357cd62db832a98c116b0000d92a6dabe73e52fd78db326416f055e4f531abb858e1a4ee680c94407e1ee01d68139635ab636723848d90a40d2a2298b5cb3cbe8366b09957fc5ee5472fb7671f1b99a7b0508949eaf27f8d356e321bb3ef7bfd1c951fe85603ff909878b9db38af432516700efc72e3847e1e86967d2a12a357a69a6cd73b73cfff08965818b338e5f5d20031bad9c612f6ea2861dd34e5be9aa536bd5b16857f8a07c834e3bcd414872719ba6e7c6936dd077c98e273537b833df0f0d1f75fb153292c2c8d93d7bede97270f771917308d5cedb3423b7f4f38cc671fcfe429d71e08440ca5f3f81930d17ed7058da07ca3460a1b5877fe36b2a65627b305aa874fb59caa32aef136326076e22f7661c916d0215a6c6b6b140ed86a97ab7721f1eb189c42936336dfa1f0df027c67b668f2a0a3b4e213423caaa03eb17c943a912122013f16ca05cc2a99"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:50:48 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1508.269991][ T37] audit: type=1804 audit(1632703848.334:671): pid=16937 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2353/memory.events" dev="sda1" ino=15089 res=1 errno=0 00:50:48 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:48 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1508.652184][ T37] audit: type=1804 audit(1632703848.694:672): pid=16937 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2353/memory.events" dev="sda1" ino=15089 res=1 errno=0 [ 1508.981909][ T37] audit: type=1800 audit(1632703849.044:673): pid=16937 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="memory.events" dev="sda1" ino=15089 res=0 errno=0 00:50:49 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:49 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:50:49 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x1d00000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:50:49 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1510.063872][ T37] kauditd_printk_skb: 2 callbacks suppressed [ 1510.063887][ T37] audit: type=1800 audit(1632703850.124:676): pid=16954 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="memory.events" dev="sda1" ino=14913 res=0 errno=0 00:50:50 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:50:50 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1510.485072][ T37] audit: type=1804 audit(1632703850.544:677): pid=16974 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2355/memory.events" dev="sda1" ino=14929 res=1 errno=0 [ 1510.794643][ T37] audit: type=1804 audit(1632703850.844:678): pid=16974 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2355/memory.events" dev="sda1" ino=14929 res=1 errno=0 00:50:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x1e00000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) [ 1511.251426][ T37] audit: type=1800 audit(1632703851.314:679): pid=16974 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="memory.events" dev="sda1" ino=14929 res=0 errno=0 00:50:51 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:51 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:51 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000004000040000000000032500009500000000000000d387777ab82499fd7a38de0cd88b09fd1d80585afff33091b533c720577af017450b2a886733ceb617f121d79e3628e72be0d39e77dcb16887214f541bb89938c19978ea22254c58d75439a1edfee2adfeaffc2d14ffab3ddc1dc20efe6f457c3913f273d7b48d10b9904fda943414bf2f1c68c4878937c8f83a5203d5b63a2689bccccbd486e66c4a5e053d3a9db4238ee52d47e704465a6a9726ba058bd85acc9322902c0200e50faf989fd44b66da1b795d04df0d9bfd21a6608880516f25136a81d6b48d5f205d0d44bfabd7013f8192a3028ad96441ba7db2c3e80f0dbf59164e8806259d3b7633f704b15c3dc9259fa3aa3106e4821a620600000000000000904c8af7cd704f4afa93fc61d6ba0e2148b09a28cd376bc43a1445c635c73a6bd9cda98b27f9981f6af46d74e057515bef88b90f987de14f2a9e1b07dd8b865715f25a4f95cc0024e18e96570000f70b24cee055e19cdab1a31b2f0fb51e0d9348aa80e2e60cd60800000088b06a13d14f14e829e4330e4475096c886864c5bf8be6441e7e24a4162d88a668b65bc80a10d3357cd62db832a98c116b0000d92a6dabe73e52fd78db326416f055e4f531abb858e1a4ee680c94407e1ee01d68139635ab636723848d90a40d2a2298b5cb3cbe8366b09957fc5ee5472fb7671f1b99a7b0508949eaf27f8d356e321bb3ef7bfd1c951fe85603ff909878b9db38af432516700efc72e3847e1e86967d2a12a357a69a6cd73b73cfff08965818b338e5f5d20031bad9c612f6ea2861dd34e5be9aa536bd5b16857f8a07c834e3bcd414872719ba6e7c6936dd077c98e273537b833df0f0d1f75fb153292c2c8d93d7bede97270f771917308d5cedb3423b7f4f38cc671fcfe429d71e08440ca5f3f81930d17ed7058da07ca3460a1b5877fe36b2a65627b305aa874fb59caa32aef136326076e22f7661c916d0215a6c6b6b140ed86a97ab7721f1eb189c42936336dfa1f0df027c67b668f2a0a3b4e213423caaa03eb17c943a912122013f16ca05cc2a99"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:50:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) [ 1511.823447][ T37] audit: type=1804 audit(1632703851.884:680): pid=16995 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2356/memory.events" dev="sda1" ino=14869 res=1 errno=0 [ 1512.039499][ T37] audit: type=1804 audit(1632703852.094:681): pid=16995 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2356/memory.events" dev="sda1" ino=14869 res=1 errno=0 00:50:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x1f00000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) [ 1512.464372][ T37] audit: type=1804 audit(1632703852.525:682): pid=17004 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir803864330/syzkaller.2gb8s7/13/memory.events" dev="sda1" ino=14577 res=1 errno=0 00:50:52 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:50:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1512.663445][ T37] audit: type=1804 audit(1632703852.715:683): pid=17004 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir803864330/syzkaller.2gb8s7/13/memory.events" dev="sda1" ino=14577 res=1 errno=0 [ 1512.892380][ T37] audit: type=1804 audit(1632703852.955:684): pid=17012 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2357/memory.events" dev="sda1" ino=15057 res=1 errno=0 00:50:53 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:53 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) [ 1513.280662][ T37] audit: type=1804 audit(1632703853.345:685): pid=17017 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2357/memory.events" dev="sda1" ino=15057 res=1 errno=0 00:50:53 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x2000000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:50:53 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000004000040000000000032500009500000000000000d387777ab82499fd7a38de0cd88b09fd1d80585afff33091b533c720577af017450b2a886733ceb617f121d79e3628e72be0d39e77dcb16887214f541bb89938c19978ea22254c58d75439a1edfee2adfeaffc2d14ffab3ddc1dc20efe6f457c3913f273d7b48d10b9904fda943414bf2f1c68c4878937c8f83a5203d5b63a2689bccccbd486e66c4a5e053d3a9db4238ee52d47e704465a6a9726ba058bd85acc9322902c0200e50faf989fd44b66da1b795d04df0d9bfd21a6608880516f25136a81d6b48d5f205d0d44bfabd7013f8192a3028ad96441ba7db2c3e80f0dbf59164e8806259d3b7633f704b15c3dc9259fa3aa3106e4821a620600000000000000904c8af7cd704f4afa93fc61d6ba0e2148b09a28cd376bc43a1445c635c73a6bd9cda98b27f9981f6af46d74e057515bef88b90f987de14f2a9e1b07dd8b865715f25a4f95cc0024e18e96570000f70b24cee055e19cdab1a31b2f0fb51e0d9348aa80e2e60cd60800000088b06a13d14f14e829e4330e4475096c886864c5bf8be6441e7e24a4162d88a668b65bc80a10d3357cd62db832a98c116b0000d92a6dabe73e52fd78db326416f055e4f531abb858e1a4ee680c94407e1ee01d68139635ab636723848d90a40d2a2298b5cb3cbe8366b09957fc5ee5472fb7671f1b99a7b0508949eaf27f8d356e321bb3ef7bfd1c951fe85603ff909878b9db38af432516700efc72e3847e1e86967d2a12a357a69a6cd73b73cfff08965818b338e5f5d20031bad9c612f6ea2861dd34e5be9aa536bd5b16857f8a07c834e3bcd414872719ba6e7c6936dd077c98e273537b833df0f0d1f75fb153292c2c8d93d7bede97270f771917308d5cedb3423b7f4f38cc671fcfe429d71e08440ca5f3f81930d17ed7058da07ca3460a1b5877fe36b2a65627b305aa874fb59caa32aef136326076e22f7661c916d0215a6c6b6b140ed86a97ab7721f1eb189c42936336dfa1f0df027c67b668f2a0a3b4e213423caaa03eb17c943a912122013f16ca05cc2a99"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:50:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:54 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) 00:50:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:54 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:54 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) 00:50:54 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) 00:50:54 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x2100000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:50:54 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x0, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:50:55 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) 00:50:55 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) 00:50:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1515.297682][ T37] kauditd_printk_skb: 5 callbacks suppressed [ 1515.297701][ T37] audit: type=1804 audit(1632703855.355:691): pid=17057 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2359/memory.events" dev="sda1" ino=15287 res=1 errno=0 00:50:55 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x2200000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:50:55 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, 0x0, 0x0) 00:50:55 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) 00:50:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:55 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x0, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) [ 1515.538324][ T37] audit: type=1804 audit(1632703855.535:692): pid=17057 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2359/memory.events" dev="sda1" ino=15287 res=1 errno=0 [ 1515.751952][ T35] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) 00:50:55 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:56 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, 0x0, 0x0) [ 1516.062648][ T37] audit: type=1804 audit(1632703856.125:693): pid=17082 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2360/memory.events" dev="sda1" ino=15288 res=1 errno=0 [ 1516.402233][ T37] audit: type=1804 audit(1632703856.395:694): pid=17081 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2360/memory.events" dev="sda1" ino=15288 res=1 errno=0 00:50:56 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x2300000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:50:56 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:56 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, 0x0, 0x0) 00:50:56 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1516.754509][ T37] audit: type=1800 audit(1632703856.815:695): pid=17081 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="memory.events" dev="sda1" ino=15288 res=0 errno=0 00:50:56 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x0, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:50:57 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:57 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x2200000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) [ 1517.253367][ T37] audit: type=1804 audit(1632703857.315:696): pid=17105 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2361/memory.events" dev="sda1" ino=15293 res=1 errno=0 00:50:57 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1517.571699][ T37] audit: type=1804 audit(1632703857.625:697): pid=17105 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2361/memory.events" dev="sda1" ino=15293 res=1 errno=0 00:50:57 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:57 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:57 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x2400000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:50:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000004000040000000000032500009500000000000000d387777ab82499fd7a38de0cd88b09fd1d80585afff33091b533c720577af017450b2a886733ceb617f121d79e3628e72be0d39e77dcb16887214f541bb89938c19978ea22254c58d75439a1edfee2adfeaffc2d14ffab3ddc1dc20efe6f457c3913f273d7b48d10b9904fda943414bf2f1c68c4878937c8f83a5203d5b63a2689bccccbd486e66c4a5e053d3a9db4238ee52d47e704465a6a9726ba058bd85acc9322902c0200e50faf989fd44b66da1b795d04df0d9bfd21a6608880516f25136a81d6b48d5f205d0d44bfabd7013f8192a3028ad96441ba7db2c3e80f0dbf59164e8806259d3b7633f704b15c3dc9259fa3aa3106e4821a620600000000000000904c8af7cd704f4afa93fc61d6ba0e2148b09a28cd376bc43a1445c635c73a6bd9cda98b27f9981f6af46d74e057515bef88b90f987de14f2a9e1b07dd8b865715f25a4f95cc0024e18e96570000f70b24cee055e19cdab1a31b2f0fb51e0d9348aa80e2e60cd60800000088b06a13d14f14e829e4330e4475096c886864c5bf8be6441e7e24a4162d88a668b65bc80a10d3357cd62db832a98c116b0000d92a6dabe73e52fd78db326416f055e4f531abb858e1a4ee680c94407e1ee01d68139635ab636723848d90a40d2a2298b5cb3cbe8366b09957fc5ee5472fb7671f1b99a7b0508949eaf27f8d356e321bb3ef7bfd1c951fe85603ff909878b9db38af432516700efc72e3847e1e86967d2a12a357a69a6cd73b73cfff08965818b338e5f5d20031bad9c612f6ea2861dd34e5be9aa536bd5b16857f8a07c834e3bcd414872719ba6e7c6936dd077c98e273537b833df0f0d1f75fb153292c2c8d93d7bede97270f771917308d5cedb3423b7f4f38cc671fcfe429d71e08440ca5f3f81930d17ed7058da07ca3460a1b5877fe36b2a65627b305aa874fb59caa32aef136326076e22f7661c916d0215a6c6b6b140ed86a97ab7721f1eb189c42936336dfa1f0df027c67b668f2a0a3b4e213423caaa03eb17c943a912122013f16ca05cc2a99"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:50:58 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:58 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:58 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:58 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x2500000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) [ 1518.390721][ T37] audit: type=1804 audit(1632703858.455:698): pid=17130 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2362/memory.events" dev="sda1" ino=14862 res=1 errno=0 00:50:58 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1518.638684][ T37] audit: type=1804 audit(1632703858.695:699): pid=17130 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2362/memory.events" dev="sda1" ino=14862 res=1 errno=0 00:50:58 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:58 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:58 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:58 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x2600000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:50:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000004000040000000000032500009500000000000000d387777ab82499fd7a38de0cd88b09fd1d80585afff33091b533c720577af017450b2a886733ceb617f121d79e3628e72be0d39e77dcb16887214f541bb89938c19978ea22254c58d75439a1edfee2adfeaffc2d14ffab3ddc1dc20efe6f457c3913f273d7b48d10b9904fda943414bf2f1c68c4878937c8f83a5203d5b63a2689bccccbd486e66c4a5e053d3a9db4238ee52d47e704465a6a9726ba058bd85acc9322902c0200e50faf989fd44b66da1b795d04df0d9bfd21a6608880516f25136a81d6b48d5f205d0d44bfabd7013f8192a3028ad96441ba7db2c3e80f0dbf59164e8806259d3b7633f704b15c3dc9259fa3aa3106e4821a620600000000000000904c8af7cd704f4afa93fc61d6ba0e2148b09a28cd376bc43a1445c635c73a6bd9cda98b27f9981f6af46d74e057515bef88b90f987de14f2a9e1b07dd8b865715f25a4f95cc0024e18e96570000f70b24cee055e19cdab1a31b2f0fb51e0d9348aa80e2e60cd60800000088b06a13d14f14e829e4330e4475096c886864c5bf8be6441e7e24a4162d88a668b65bc80a10d3357cd62db832a98c116b0000d92a6dabe73e52fd78db326416f055e4f531abb858e1a4ee680c94407e1ee01d68139635ab636723848d90a40d2a2298b5cb3cbe8366b09957fc5ee5472fb7671f1b99a7b0508949eaf27f8d356e321bb3ef7bfd1c951fe85603ff909878b9db38af432516700efc72e3847e1e86967d2a12a357a69a6cd73b73cfff08965818b338e5f5d20031bad9c612f6ea2861dd34e5be9aa536bd5b16857f8a07c834e3bcd414872719ba6e7c6936dd077c98e273537b833df0f0d1f75fb153292c2c8d93d7bede97270f771917308d5cedb3423b7f4f38cc671fcfe429d71e08440ca5f3f81930d17ed7058da07ca3460a1b5877fe36b2a65627b305aa874fb59caa32aef136326076e22f7661c916d0215a6c6b6b140ed86a97ab7721f1eb189c42936336dfa1f0df027c67b668f2a0a3b4e213423caaa03eb17c943a912122013f16ca05cc2a99"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:50:59 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:59 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:59 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:50:59 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x2700000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) [ 1519.441996][ T37] audit: type=1804 audit(1632703859.505:700): pid=17162 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2363/memory.events" dev="sda1" ino=14577 res=1 errno=0 00:51:00 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:00 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) [ 1520.460258][ T37] kauditd_printk_skb: 1 callbacks suppressed [ 1520.460275][ T37] audit: type=1804 audit(1632703860.525:702): pid=17183 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2364/memory.events" dev="sda1" ino=15323 res=1 errno=0 [ 1520.639214][ T37] audit: type=1804 audit(1632703860.695:703): pid=17184 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir701728280/syzkaller.vddHzq/2364/memory.events" dev="sda1" ino=15323 res=1 errno=0 [ 1524.576730][T17194] chnl_net:caif_netlink_parms(): no params data found [ 1524.686347][T17194] bridge0: port 1(bridge_slave_0) entered blocking state [ 1524.694481][T17194] bridge0: port 1(bridge_slave_0) entered disabled state [ 1524.703510][T17194] device bridge_slave_0 entered promiscuous mode [ 1524.714312][T17194] bridge0: port 2(bridge_slave_1) entered blocking state [ 1524.723542][T17194] bridge0: port 2(bridge_slave_1) entered disabled state [ 1524.732717][T17194] device bridge_slave_1 entered promiscuous mode [ 1524.770593][T17194] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1524.782412][T17194] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1524.829806][T17194] team0: Port device team_slave_0 added [ 1524.838354][T17194] team0: Port device team_slave_1 added [ 1524.873882][T17194] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1524.881854][T17194] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1524.908047][T17194] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1524.921770][T17194] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1524.930482][T17194] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1524.957743][T17194] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1525.006091][T17194] device hsr_slave_0 entered promiscuous mode [ 1525.013551][T17194] device hsr_slave_1 entered promiscuous mode [ 1525.022620][T17194] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1525.031453][T17194] Cannot create hsr debugfs directory [ 1525.157748][T17194] bridge0: port 2(bridge_slave_1) entered blocking state [ 1525.164836][T17194] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1525.172249][T17194] bridge0: port 1(bridge_slave_0) entered blocking state [ 1525.179413][T17194] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1525.242334][T17194] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1525.258865][T10293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1525.267199][T10293] bridge0: port 1(bridge_slave_0) entered disabled state [ 1525.276562][T10293] bridge0: port 2(bridge_slave_1) entered disabled state [ 1525.286105][T10293] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1525.301428][T17194] 8021q: adding VLAN 0 to HW filter on device team0 [ 1525.315522][T14622] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1525.325724][T14622] bridge0: port 1(bridge_slave_0) entered blocking state [ 1525.333165][T14622] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1525.350423][T15888] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1525.359333][T15888] bridge0: port 2(bridge_slave_1) entered blocking state [ 1525.366393][T15888] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1525.389024][T14622] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1525.398675][T14622] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1525.409031][T15888] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1525.433415][T17194] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1525.444914][T17194] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1525.458913][T14622] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1525.469067][T14622] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1525.491925][T14622] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1525.505176][T14622] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1525.514383][T14622] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1525.526119][T17194] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1525.606579][T10293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1525.615671][T10293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1525.642068][T14622] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1525.650466][T14622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1525.661450][T14622] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1525.670058][T14622] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1525.682103][T17194] device veth0_vlan entered promiscuous mode [ 1525.698572][T17194] device veth1_vlan entered promiscuous mode [ 1525.726480][T10293] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1525.735288][T10293] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1525.744431][T10293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1525.754136][T10293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1525.770256][T17194] device veth0_macvtap entered promiscuous mode [ 1525.782004][T17194] device veth1_macvtap entered promiscuous mode [ 1525.801386][T17194] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1525.812018][T17194] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1525.822908][T17194] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1525.833862][T17194] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1525.844299][T17194] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1525.855153][T17194] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1525.865606][T17194] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1525.876763][T17194] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1525.887814][T17194] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1525.900293][T17194] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1525.910615][T17194] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1525.921773][T17194] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1525.932976][T17194] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1525.945092][T17194] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1525.956709][T17194] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1525.967000][T15245] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1525.976613][T15245] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1525.985251][T15245] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1525.995430][T15245] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1526.022488][T17194] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1526.033714][T17194] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1526.043638][T17194] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1526.054631][T17194] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1526.064971][T17194] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1526.075635][T17194] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1526.086207][T17194] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1526.098698][T17194] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1526.109980][T17194] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1526.121598][T17194] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1526.132521][T17194] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1526.143643][T17194] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1526.155513][T17194] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1526.167432][T17194] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1526.179770][T17194] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1526.189933][T15888] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1526.199314][T15888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1526.310692][ T35] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1526.335149][ T35] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1526.347749][T15245] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1526.396249][T23070] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1526.405439][T23070] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1526.416966][ T6990] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1526.477848][T15245] Bluetooth: hci5: command 0x0409 tx timeout 00:51:06 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:06 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:06 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:06 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x2800000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:51:06 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:51:07 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000004000040000000000032500009500000000000000d387777ab82499fd7a38de0cd88b09fd1d80585afff33091b533c720577af017450b2a886733ceb617f121d79e3628e72be0d39e77dcb16887214f541bb89938c19978ea22254c58d75439a1edfee2adfeaffc2d14ffab3ddc1dc20efe6f457c3913f273d7b48d10b9904fda943414bf2f1c68c4878937c8f83a5203d5b63a2689bccccbd486e66c4a5e053d3a9db4238ee52d47e704465a6a9726ba058bd85acc9322902c0200e50faf989fd44b66da1b795d04df0d9bfd21a6608880516f25136a81d6b48d5f205d0d44bfabd7013f8192a3028ad96441ba7db2c3e80f0dbf59164e8806259d3b7633f704b15c3dc9259fa3aa3106e4821a620600000000000000904c8af7cd704f4afa93fc61d6ba0e2148b09a28cd376bc43a1445c635c73a6bd9cda98b27f9981f6af46d74e057515bef88b90f987de14f2a9e1b07dd8b865715f25a4f95cc0024e18e96570000f70b24cee055e19cdab1a31b2f0fb51e0d9348aa80e2e60cd60800000088b06a13d14f14e829e4330e4475096c886864c5bf8be6441e7e24a4162d88a668b65bc80a10d3357cd62db832a98c116b0000d92a6dabe73e52fd78db326416f055e4f531abb858e1a4ee680c94407e1ee01d68139635ab636723848d90a40d2a2298b5cb3cbe8366b09957fc5ee5472fb7671f1b99a7b0508949eaf27f8d356e321bb3ef7bfd1c951fe85603ff909878b9db38af432516700efc72e3847e1e86967d2a12a357a69a6cd73b73cfff08965818b338e5f5d20031bad9c612f6ea2861dd34e5be9aa536bd5b16857f8a07c834e3bcd414872719ba6e7c6936dd077c98e273537b833df0f0d1f75fb153292c2c8d93d7bede97270f771917308d5cedb3423b7f4f38cc671fcfe429d71e08440ca5f3f81930d17ed7058da07ca3460a1b5877fe36b2a65627b305aa874fb59caa32aef136326076e22f7661c916d0215a6c6b6b140ed86a97ab7721f1eb189c42936336dfa1f0df027c67b668f2a0a3b4e213423caaa03eb17c943a912122013f16ca05cc2a99"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:51:07 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:07 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:07 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:07 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:07 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x2900000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:51:08 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1528.567289][T15245] Bluetooth: hci5: command 0x041b tx timeout 00:51:08 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:08 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:08 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:09 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x2a00000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:51:09 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) [ 1530.637269][T15245] Bluetooth: hci5: command 0x040f tx timeout [ 1530.912214][ T3926] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1531.629970][ T3926] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1532.126266][ T3926] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1532.717132][ T2947] Bluetooth: hci5: command 0x0419 tx timeout [ 1532.843929][ T3926] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1532.980156][ T3926] device 0 left promiscuous mode [ 1533.067666][ T3926] device 1 left promiscuous mode [ 1533.157116][ T3926] device 2 left promiscuous mode [ 1535.277850][T17610] chnl_net:caif_netlink_parms(): no params data found [ 1535.616909][ T10] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 1535.764732][T17610] bridge0: port 1(bridge_slave_0) entered blocking state [ 1535.772162][T17610] bridge0: port 1(bridge_slave_0) entered disabled state [ 1535.781884][T17610] device bridge_slave_0 entered promiscuous mode [ 1535.792824][T17610] bridge0: port 2(bridge_slave_1) entered blocking state [ 1535.803007][T17610] bridge0: port 2(bridge_slave_1) entered disabled state [ 1535.811906][T17610] device bridge_slave_1 entered promiscuous mode [ 1535.916816][T10293] Bluetooth: hci4: command 0x0409 tx timeout [ 1536.259262][T17610] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1536.274776][T17610] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1536.705609][T17610] team0: Port device team_slave_0 added [ 1536.718049][T17610] team0: Port device team_slave_1 added [ 1537.133879][T17610] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1537.144519][T17610] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1537.173739][T17610] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1537.576870][T17610] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1537.583934][T17610] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1537.611950][T17610] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1537.996731][ T9541] Bluetooth: hci4: command 0x041b tx timeout [ 1538.056173][T17610] device hsr_slave_0 entered promiscuous mode [ 1538.064342][T17610] device hsr_slave_1 entered promiscuous mode [ 1538.072683][T17610] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1538.083348][T17610] Cannot create hsr debugfs directory [ 1538.383919][T17610] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1538.428699][ T6990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1538.440113][ T6990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1538.454308][T17610] 8021q: adding VLAN 0 to HW filter on device team0 [ 1538.476579][ T6990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1538.498121][ T6990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1538.508786][ T6990] bridge0: port 1(bridge_slave_0) entered blocking state [ 1538.515872][ T6990] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1538.542314][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1538.550586][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1538.562468][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1538.572336][ T9541] bridge0: port 2(bridge_slave_1) entered blocking state [ 1538.579513][ T9541] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1538.589110][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1538.625455][T15888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1538.635032][T15888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1538.645945][T15888] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1538.678922][T31733] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1538.688813][T31733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1538.697914][T31733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1538.706318][T31733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1538.719271][T31733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1538.729388][T31733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1538.739019][T31733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1538.751976][T17610] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1538.819820][T10293] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1538.828026][T10293] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1538.843915][T17610] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1538.996338][T10293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1539.005256][T10293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1539.071205][T17610] device veth0_vlan entered promiscuous mode [ 1539.080073][T31733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1539.091511][T31733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1539.120206][T17610] device veth1_vlan entered promiscuous mode [ 1539.148072][T10293] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1539.160902][T10293] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1539.169092][T10293] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1539.209729][ T2947] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1539.219803][ T2947] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1539.229759][ T2947] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1539.248685][T17610] device veth0_macvtap entered promiscuous mode [ 1539.671575][T17610] device veth1_macvtap entered promiscuous mode [ 1539.685890][T14622] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1539.697109][T14622] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1539.741321][ T3926] device hsr_slave_0 left promiscuous mode [ 1539.753021][ T3926] device hsr_slave_1 left promiscuous mode [ 1539.760336][ T3926] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1539.769100][ T3926] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1539.779671][ T3926] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1539.787277][ T3926] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1539.795949][ T3926] device team0 left promiscuous mode [ 1539.801806][ T3926] device team_slave_1 left promiscuous mode [ 1539.809063][ T3926] bridge0: port 3(team0) entered disabled state [ 1539.818496][ T3926] device bridge_slave_1 left promiscuous mode [ 1539.824692][ T3926] bridge0: port 2(bridge_slave_1) entered disabled state [ 1539.833883][ T3926] device bridge_slave_0 left promiscuous mode [ 1539.843554][ T3926] bridge0: port 1(bridge_slave_0) entered disabled state [ 1539.859471][ T3926] device veth1_macvtap left promiscuous mode [ 1539.865546][ T3926] device veth0_macvtap left promiscuous mode [ 1539.872742][ T3926] device veth1_vlan left promiscuous mode [ 1539.879299][ T3926] device veth0_vlan left promiscuous mode [ 1540.076597][T10293] Bluetooth: hci4: command 0x040f tx timeout [ 1542.157193][T17983] Bluetooth: hci4: command 0x0419 tx timeout [ 1545.601949][ T3252] ieee802154 phy0 wpan0: encryption failed: -22 [ 1545.608319][ T3252] ieee802154 phy1 wpan1: encryption failed: -22 [ 1546.879891][T23070] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 1558.330373][ T3926] team0 (unregistering): Port device team_slave_1 removed [ 1558.354853][ T3926] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1558.373934][ T3926] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1558.455927][ T3926] bond0 (unregistering): Released all slaves [ 1558.525573][T17610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1558.536684][T17610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1558.547839][T17610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1558.559749][T17610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1558.569934][T17610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1558.580616][T17610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1558.591006][T17610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1558.602269][T17610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1558.612654][T17610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1558.623364][T17610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1558.633804][T17610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1558.644322][T17610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1558.655637][T17610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1558.666305][T17610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1558.677860][T17610] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1558.705968][T15245] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1558.714804][T15245] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1558.729968][T17610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1558.741329][T17610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1558.752088][T17610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1558.763729][T17610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1558.774157][T17610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1558.785003][T17610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1558.796477][T17610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1558.808775][T17610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1558.819036][T17610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1558.830704][T17610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1558.841525][T17610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1558.854191][T17610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1558.864842][T17610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1558.875778][T17610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1558.887351][T17610] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1558.897322][T15245] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1558.905977][T15245] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1559.023346][T23070] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1559.040956][T23070] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1559.102534][T17983] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1559.146851][T23070] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1559.155903][T23070] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1559.165827][T17983] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1559.316921][ T37] audit: type=1804 audit(1632703899.378:704): pid=18046 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir771173580/syzkaller.LgaEjD/0/memory.events" dev="sda1" ino=14837 res=1 errno=0 [ 1559.462053][ T37] audit: type=1804 audit(1632703899.518:705): pid=18046 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir771173580/syzkaller.LgaEjD/0/memory.events" dev="sda1" ino=14837 res=1 errno=0 00:51:39 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:51:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x2b00000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:51:39 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:39 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:39 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) 00:51:40 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) [ 1560.038867][ T37] audit: type=1804 audit(1632703900.098:706): pid=18062 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir771173580/syzkaller.LgaEjD/1/memory.events" dev="sda1" ino=14305 res=1 errno=0 00:51:40 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1560.399006][ T37] audit: type=1804 audit(1632703900.448:707): pid=18062 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir771173580/syzkaller.LgaEjD/1/memory.events" dev="sda1" ino=14305 res=1 errno=0 00:51:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x2c00000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:51:40 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_type(r0, 0x0, 0x0) 00:51:40 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:40 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:40 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r2, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r3 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r3, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r4, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:51:41 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_type(r0, 0x0, 0x0) [ 1561.200522][ T37] audit: type=1804 audit(1632703901.258:708): pid=18084 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir771173580/syzkaller.LgaEjD/2/memory.events" dev="sda1" ino=14049 res=1 errno=0 00:51:41 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x2d00000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:51:41 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1561.454676][ T37] audit: type=1804 audit(1632703901.448:709): pid=18084 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir771173580/syzkaller.LgaEjD/2/memory.events" dev="sda1" ino=14049 res=1 errno=0 00:51:41 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:41 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:41 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_type(r0, 0x0, 0x0) 00:51:41 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r2, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r3 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r3, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r4, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:51:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x2e00000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:51:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r2, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r3 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r3, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r4, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:51:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:42 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:42 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r2, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r3 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r3, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r4, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) [ 1562.873307][ T37] audit: type=1804 audit(1632703902.928:710): pid=18112 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir370302997/syzkaller.ivPNpx/2527/memory.events" dev="sda1" ino=13843 res=1 errno=0 [ 1563.080356][ T37] audit: type=1804 audit(1632703903.138:711): pid=18112 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir370302997/syzkaller.ivPNpx/2527/memory.events" dev="sda1" ino=13843 res=1 errno=0 [ 1563.386845][ T37] audit: type=1804 audit(1632703903.338:712): pid=18124 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir771173580/syzkaller.LgaEjD/4/memory.events" dev="sda1" ino=14893 res=1 errno=0 00:51:43 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x2f00000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:51:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1563.770285][ T37] audit: type=1804 audit(1632703903.648:713): pid=18128 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir771173580/syzkaller.LgaEjD/4/memory.events" dev="sda1" ino=14893 res=1 errno=0 00:51:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:43 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:44 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r2, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) r3 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r3, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r4, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:51:44 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x3000000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:51:44 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:44 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1564.497610][ T37] audit: type=1804 audit(1632703904.558:714): pid=18150 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir771173580/syzkaller.LgaEjD/5/memory.events" dev="sda1" ino=13969 res=1 errno=0 [ 1564.784438][ T37] audit: type=1804 audit(1632703904.648:715): pid=18150 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir771173580/syzkaller.LgaEjD/5/memory.events" dev="sda1" ino=13969 res=1 errno=0 00:51:45 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r2, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) r3 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r3, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r4, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:51:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x3100000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:51:45 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) 00:51:45 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:45 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1565.284967][ T37] audit: type=1804 audit(1632703905.338:716): pid=18169 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir771173580/syzkaller.LgaEjD/6/memory.events" dev="sda1" ino=13959 res=1 errno=0 [ 1565.450775][ T37] audit: type=1804 audit(1632703905.488:717): pid=18169 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir771173580/syzkaller.LgaEjD/6/memory.events" dev="sda1" ino=13959 res=1 errno=0 00:51:45 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000004000040000000000032500009500000000000000d387777ab82499fd7a38de0cd88b09fd1d80585afff33091b533c720577af017450b2a886733ceb617f121d79e3628e72be0d39e77dcb16887214f541bb89938c19978ea22254c58d75439a1edfee2adfeaffc2d14ffab3ddc1dc20efe6f457c3913f273d7b48d10b9904fda943414bf2f1c68c4878937c8f83a5203d5b63a2689bccccbd486e66c4a5e053d3a9db4238ee52d47e704465a6a9726ba058bd85acc9322902c0200e50faf989fd44b66da1b795d04df0d9bfd21a6608880516f25136a81d6b48d5f205d0d44bfabd7013f8192a3028ad96441ba7db2c3e80f0dbf59164e8806259d3b7633f704b15c3dc9259fa3aa3106e4821a620600000000000000904c8af7cd704f4afa93fc61d6ba0e2148b09a28cd376bc43a1445c635c73a6bd9cda98b27f9981f6af46d74e057515bef88b90f987de14f2a9e1b07dd8b865715f25a4f95cc0024e18e96570000f70b24cee055e19cdab1a31b2f0fb51e0d9348aa80e2e60cd60800000088b06a13d14f14e829e4330e4475096c886864c5bf8be6441e7e24a4162d88a668b65bc80a10d3357cd62db832a98c116b0000d92a6dabe73e52fd78db326416f055e4f531abb858e1a4ee680c94407e1ee01d68139635ab636723848d90a40d2a2298b5cb3cbe8366b09957fc5ee5472fb7671f1b99a7b0508949eaf27f8d356e321bb3ef7bfd1c951fe85603ff909878b9db38af432516700efc72e3847e1e86967d2a12a357a69a6cd73b73cfff08965818b338e5f5d20031bad9c612f6ea2861dd34e5be9aa536bd5b16857f8a07c834e3bcd414872719ba6e7c6936dd077c98e273537b833df0f0d1f75fb153292c2c8d93d7bede97270f771917308d5cedb3423b7f4f38cc671fcfe429d71e08440ca5f3f81930d17ed7058da07ca3460a1b5877fe36b2a65627b305aa874fb59caa32aef136326076e22f7661c916d0215a6c6b6b140ed86a97ab7721f1eb189c42936336dfa1f0df027c67b668f2a0a3b4e213423caaa03eb17c943a912122013f16ca05cc2a99"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r2, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) r3 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r3, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r4, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:51:46 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) [ 1566.388864][ T37] audit: type=1804 audit(1632703906.448:718): pid=18192 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir771173580/syzkaller.LgaEjD/7/memory.events" dev="sda1" ino=14949 res=1 errno=0 [ 1566.540848][T23070] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) 00:51:46 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:46 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1566.704847][ T37] audit: type=1804 audit(1632703906.758:719): pid=18194 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir771173580/syzkaller.LgaEjD/7/memory.events" dev="sda1" ino=14949 res=1 errno=0 00:51:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x3200000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:51:46 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:47 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) 00:51:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) [ 1567.582576][ T37] audit: type=1804 audit(1632703907.638:720): pid=18216 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir771173580/syzkaller.LgaEjD/8/memory.events" dev="sda1" ino=14956 res=1 errno=0 00:51:47 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, 0x0, 0x0) 00:51:47 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) 00:51:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x3300000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) [ 1567.826063][ T37] audit: type=1804 audit(1632703907.818:721): pid=18216 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir771173580/syzkaller.LgaEjD/8/memory.events" dev="sda1" ino=14956 res=1 errno=0 00:51:48 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:51:48 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, 0x0, 0x0) 00:51:48 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x3400000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:51:48 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) [ 1568.387968][ T37] audit: type=1804 audit(1632703908.448:722): pid=18234 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir771173580/syzkaller.LgaEjD/9/memory.events" dev="sda1" ino=14564 res=1 errno=0 00:51:48 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, 0x0, 0x0) [ 1568.598219][ T37] audit: type=1804 audit(1632703908.578:723): pid=18236 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir771173580/syzkaller.LgaEjD/9/memory.events" dev="sda1" ino=14564 res=1 errno=0 00:51:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) 00:51:49 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:51:49 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:49 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:49 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:49 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x3500000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) [ 1569.740314][ T37] audit: type=1804 audit(1632703909.798:724): pid=18262 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir771173580/syzkaller.LgaEjD/10/memory.events" dev="sda1" ino=14849 res=1 errno=0 [ 1570.087875][ T37] audit: type=1804 audit(1632703910.128:725): pid=18262 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir771173580/syzkaller.LgaEjD/10/memory.events" dev="sda1" ino=14849 res=1 errno=0 00:51:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x3600000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:51:50 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:50 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:51:50 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x3700000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:51:50 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1570.818684][ T37] audit: type=1804 audit(1632703910.878:726): pid=18292 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir771173580/syzkaller.LgaEjD/11/memory.events" dev="sda1" ino=14564 res=1 errno=0 [ 1571.159790][ T37] audit: type=1804 audit(1632703911.198:727): pid=18292 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir771173580/syzkaller.LgaEjD/11/memory.events" dev="sda1" ino=14564 res=1 errno=0 00:51:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x3800000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:51:51 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:51 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:51 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:51:52 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:52 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:51:52 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x3900000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:51:53 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x3a00000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:51:53 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000004000040000000000032500009500000000000000d387777ab82499fd7a38de0cd88b09fd1d80585afff33091b533c720577af017450b2a886733ceb617f121d79e3628e72be0d39e77dcb16887214f541bb89938c19978ea22254c58d75439a1edfee2adfeaffc2d14ffab3ddc1dc20efe6f457c3913f273d7b48d10b9904fda943414bf2f1c68c4878937c8f83a5203d5b63a2689bccccbd486e66c4a5e053d3a9db4238ee52d47e704465a6a9726ba058bd85acc9322902c0200e50faf989fd44b66da1b795d04df0d9bfd21a6608880516f25136a81d6b48d5f205d0d44bfabd7013f8192a3028ad96441ba7db2c3e80f0dbf59164e8806259d3b7633f704b15c3dc9259fa3aa3106e4821a620600000000000000904c8af7cd704f4afa93fc61d6ba0e2148b09a28cd376bc43a1445c635c73a6bd9cda98b27f9981f6af46d74e057515bef88b90f987de14f2a9e1b07dd8b865715f25a4f95cc0024e18e96570000f70b24cee055e19cdab1a31b2f0fb51e0d9348aa80e2e60cd60800000088b06a13d14f14e829e4330e4475096c886864c5bf8be6441e7e24a4162d88a668b65bc80a10d3357cd62db832a98c116b0000d92a6dabe73e52fd78db326416f055e4f531abb858e1a4ee680c94407e1ee01d68139635ab636723848d90a40d2a2298b5cb3cbe8366b09957fc5ee5472fb7671f1b99a7b0508949eaf27f8d356e321bb3ef7bfd1c951fe85603ff909878b9db38af432516700efc72e3847e1e86967d2a12a357a69a6cd73b73cfff08965818b338e5f5d20031bad9c612f6ea2861dd34e5be9aa536bd5b16857f8a07c834e3bcd414872719ba6e7c6936dd077c98e273537b833df0f0d1f75fb153292c2c8d93d7bede97270f771917308d5cedb3423b7f4f38cc671fcfe429d71e08440ca5f3f81930d17ed7058da07ca3460a1b5877fe36b2a65627b305aa874fb59caa32aef136326076e22f7661c916d0215a6c6b6b140ed86a97ab7721f1eb189c42936336dfa1f0df027c67b668f2a0a3b4e213423caaa03eb17c943a912122013f16ca05cc2a99"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:51:53 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:54 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:54 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1574.040396][ T37] audit: type=1804 audit(1632703914.098:728): pid=18348 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir771173580/syzkaller.LgaEjD/14/memory.events" dev="sda1" ino=13889 res=1 errno=0 00:51:54 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) [ 1574.190377][ T37] audit: type=1804 audit(1632703914.098:729): pid=18348 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir771173580/syzkaller.LgaEjD/14/memory.events" dev="sda1" ino=13889 res=1 errno=0 [ 1574.768885][ T37] audit: type=1804 audit(1632703914.828:730): pid=18362 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir771173580/syzkaller.LgaEjD/15/memory.events" dev="sda1" ino=15013 res=1 errno=0 00:51:55 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) [ 1575.064361][ T37] audit: type=1804 audit(1632703914.828:731): pid=18362 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir771173580/syzkaller.LgaEjD/15/memory.events" dev="sda1" ino=15013 res=1 errno=0 00:51:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) 00:51:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) (fail_nth: 1) 00:51:55 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:55 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x3b00000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) [ 1575.297374][ T37] audit: type=1804 audit(1632703915.359:732): pid=18370 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir771173580/syzkaller.LgaEjD/16/memory.events" dev="sda1" ino=14690 res=1 errno=0 [ 1575.435944][ T37] audit: type=1804 audit(1632703915.419:733): pid=18370 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir771173580/syzkaller.LgaEjD/16/memory.events" dev="sda1" ino=14690 res=1 errno=0 00:51:55 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000004000040000000000032500009500000000000000d387777ab82499fd7a38de0cd88b09fd1d80585afff33091b533c720577af017450b2a886733ceb617f121d79e3628e72be0d39e77dcb16887214f541bb89938c19978ea22254c58d75439a1edfee2adfeaffc2d14ffab3ddc1dc20efe6f457c3913f273d7b48d10b9904fda943414bf2f1c68c4878937c8f83a5203d5b63a2689bccccbd486e66c4a5e053d3a9db4238ee52d47e704465a6a9726ba058bd85acc9322902c0200e50faf989fd44b66da1b795d04df0d9bfd21a6608880516f25136a81d6b48d5f205d0d44bfabd7013f8192a3028ad96441ba7db2c3e80f0dbf59164e8806259d3b7633f704b15c3dc9259fa3aa3106e4821a620600000000000000904c8af7cd704f4afa93fc61d6ba0e2148b09a28cd376bc43a1445c635c73a6bd9cda98b27f9981f6af46d74e057515bef88b90f987de14f2a9e1b07dd8b865715f25a4f95cc0024e18e96570000f70b24cee055e19cdab1a31b2f0fb51e0d9348aa80e2e60cd60800000088b06a13d14f14e829e4330e4475096c886864c5bf8be6441e7e24a4162d88a668b65bc80a10d3357cd62db832a98c116b0000d92a6dabe73e52fd78db326416f055e4f531abb858e1a4ee680c94407e1ee01d68139635ab636723848d90a40d2a2298b5cb3cbe8366b09957fc5ee5472fb7671f1b99a7b0508949eaf27f8d356e321bb3ef7bfd1c951fe85603ff909878b9db38af432516700efc72e3847e1e86967d2a12a357a69a6cd73b73cfff08965818b338e5f5d20031bad9c612f6ea2861dd34e5be9aa536bd5b16857f8a07c834e3bcd414872719ba6e7c6936dd077c98e273537b833df0f0d1f75fb153292c2c8d93d7bede97270f771917308d5cedb3423b7f4f38cc671fcfe429d71e08440ca5f3f81930d17ed7058da07ca3460a1b5877fe36b2a65627b305aa874fb59caa32aef136326076e22f7661c916d0215a6c6b6b140ed86a97ab7721f1eb189c42936336dfa1f0df027c67b668f2a0a3b4e213423caaa03eb17c943a912122013f16ca05cc2a99"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) 00:51:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) 00:51:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1575.703850][T18380] FAULT_INJECTION: forcing a failure. [ 1575.703850][T18380] name failslab, interval 1, probability 0, space 0, times 0 [ 1575.760927][T18380] CPU: 1 PID: 18380 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 1575.769531][T18380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1575.779610][T18380] Call Trace: [ 1575.782908][T18380] dump_stack_lvl+0xcd/0x134 [ 1575.787534][T18380] should_fail.cold+0x5/0xa [ 1575.792084][T18380] ? bdi_split_work_to_wbs+0x2ab/0xd70 [ 1575.797646][T18380] should_failslab+0x5/0x10 [ 1575.802183][T18380] kmem_cache_alloc_trace+0x55/0x3c0 [ 1575.807514][T18380] bdi_split_work_to_wbs+0x2ab/0xd70 [ 1575.812843][T18380] ? wb_wait_for_completion+0x240/0x240 [ 1575.818435][T18380] ? lock_release+0x720/0x720 [ 1575.823159][T18380] __writeback_inodes_sb_nr+0x1cf/0x280 [ 1575.828732][T18380] ? bdi_split_work_to_wbs+0xd70/0xd70 [ 1575.834235][T18380] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 1575.840509][T18380] ? cpumask_next+0xa4/0xf0 [ 1575.845110][T18380] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 1575.850847][T18380] ? get_nr_dirty_inodes+0x16f/0x210 [ 1575.856242][T18380] try_to_writeback_inodes_sb+0x94/0xc0 [ 1575.861914][T18380] ext4_nonda_switch+0x1aa/0x1f0 [ 1575.866880][T18380] ext4_da_write_begin+0x17b/0x11c0 [ 1575.872208][T18380] ? ext4_write_begin+0x14c0/0x14c0 [ 1575.877438][T18380] ? iov_iter_fault_in_readable+0x208/0x2c0 [ 1575.883429][T18380] ? dup_iter+0x280/0x280 [ 1575.887795][T18380] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 1575.894076][T18380] ? __mark_inode_dirty+0xb97/0xfe0 [ 1575.899373][T18380] generic_perform_write+0x202/0x510 [ 1575.904740][T18380] ? filemap_fdatawrite_wbc+0x2f0/0x2f0 [ 1575.910298][T18380] ? __down_timeout+0x10/0x10 [ 1575.915010][T18380] ext4_buffered_write_iter+0x244/0x500 [ 1575.920611][T18380] ext4_file_write_iter+0x423/0x14e0 [ 1575.925936][T18380] ? ext4_buffered_write_iter+0x500/0x500 [ 1575.931673][T18380] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 1575.937655][T18380] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 1575.944002][T18380] new_sync_write+0x429/0x660 [ 1575.948690][T18380] ? new_sync_read+0x6e0/0x6e0 [ 1575.953484][T18380] ? lock_release+0x720/0x720 [ 1575.958181][T18380] vfs_write+0x7cf/0xae0 [ 1575.962434][T18380] ksys_write+0x12d/0x250 [ 1575.966772][T18380] ? __ia32_sys_read+0xb0/0xb0 [ 1575.971539][T18380] ? syscall_enter_from_user_mode+0x21/0x70 [ 1575.977470][T18380] do_syscall_64+0x35/0xb0 [ 1575.981915][T18380] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1575.987823][T18380] RIP: 0033:0x7fefd8245709 [ 1575.992271][T18380] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 00:51:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x3c00000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) [ 1576.011904][T18380] RSP: 002b:00007fefd579b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1576.020426][T18380] RAX: ffffffffffffffda RBX: 00007fefd834a020 RCX: 00007fefd8245709 [ 1576.028506][T18380] RDX: 000000012000005f RSI: 0000000020000140 RDI: 0000000000000003 [ 1576.036496][T18380] RBP: 00007fefd579b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1576.044465][T18380] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1576.052439][T18380] R13: 00007ffe1718a3ef R14: 00007fefd579b300 R15: 0000000000022000 00:51:56 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) 00:51:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x3d00000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) [ 1576.534702][ T37] audit: type=1804 audit(1632703916.599:734): pid=18400 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir771173580/syzkaller.LgaEjD/17/memory.events" dev="sda1" ino=13881 res=1 errno=0 00:51:56 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) close(r1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x3, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x1, 0xb, 0x6, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x51, 0xfffffffffffffff0}], 0x0, 0x1, 0x23, &(0x7f0000000240)=""/35, 0x40f00, 0x30, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x10, 0x4, 0x101}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x4, r1, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) recvmsg$unix(r4, &(0x7f0000000800)={&(0x7f0000000500), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000580)=""/171, 0xab}, {&(0x7f0000000640)=""/28, 0x1c}, {&(0x7f0000000680)=""/127, 0x7f}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="0c000000000000000600000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100001a01000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x121a2) openat$cgroup_ro(r5, &(0x7f0000000840)='memory.events\x00', 0x0, 0x0) [ 1576.662327][ T37] audit: type=1804 audit(1632703916.629:735): pid=18400 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir771173580/syzkaller.LgaEjD/17/memory.events" dev="sda1" ino=13881 res=1 errno=0 00:51:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x808d9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x3e00000000000000) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 00:51:56 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 00:51:56 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8126}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 1576.920672][ T37] audit: type=1804 audit(1632703916.939:736): pid=18410 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir771173580/syzkaller.LgaEjD/18/memory.events" dev="sda1" ino=13954 res=1 errno=0 [ 1577.056832][ T37] audit: type=1804 audit(1632703917.009:737): pid=18410 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir771173580/syzkaller.LgaEjD/18/memory.events" dev="sda1" ino=13954 res=1 errno=0 [ 1577.802935][ T185] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 1582.621853][T18427] chnl_net:caif_netlink_parms(): no params data found [ 1583.091880][T18427] bridge0: port 1(bridge_slave_0) entered blocking state [ 1583.099911][T18427] bridge0: port 1(bridge_slave_0) entered disabled state [ 1583.110313][T18427] device bridge_slave_0 entered promiscuous mode [ 1583.130039][T18427] bridge0: port 2(bridge_slave_1) entered blocking state [ 1583.137281][T18427] bridge0: port 2(bridge_slave_1) entered disabled state [ 1583.145782][T18427] device bridge_slave_1 entered promiscuous mode [ 1583.200121][T18427] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1583.224655][T18427] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1583.302629][T18427] team0: Port device team_slave_0 added [ 1583.353819][T15888] Bluetooth: hci2: command 0x0409 tx timeout [ 1583.716646][T18427] team0: Port device team_slave_1 added [ 1583.750969][T18427] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1583.758444][T18427] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1583.785992][T18427] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1583.810499][T18427] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1583.823844][T18427] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1583.853741][T18427] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1584.276199][T18427] device hsr_slave_0 entered promiscuous mode [ 1584.283277][T18427] device hsr_slave_1 entered promiscuous mode [ 1584.332768][ T3926] device hsr_slave_0 left promiscuous mode [ 1584.343130][ T3926] device hsr_slave_1 left promiscuous mode [ 1584.353077][ T3926] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1584.362348][ T3926] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1584.373146][ T3926] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1584.381407][ T3926] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1584.391738][ T3926] device team0 left promiscuous mode [ 1584.397410][ T3926] device team_slave_1 left promiscuous mode [ 1584.403475][ T3926] bridge0: port 3(team0) entered disabled state [ 1584.419098][ T3926] device bridge_slave_1 left promiscuous mode [ 1584.425714][ T3926] bridge0: port 2(bridge_slave_1) entered disabled state [ 1584.435360][ T3926] device bridge_slave_0 left promiscuous mode [ 1584.441556][ T3926] bridge0: port 1(bridge_slave_0) entered disabled state [ 1584.454429][ T3926] device veth1_macvtap left promiscuous mode [ 1584.461123][ T3926] device veth0_macvtap left promiscuous mode [ 1584.467752][ T3926] device veth1_vlan left promiscuous mode [ 1584.474441][ T3926] device veth0_vlan left promiscuous mode [ 1585.433672][T31733] Bluetooth: hci2: command 0x041b tx timeout [ 1587.513504][T31733] Bluetooth: hci2: command 0x040f tx timeout [ 1588.633632][T15245] Bluetooth: hci3: command 0x0406 tx timeout [ 1589.593511][ T6693] Bluetooth: hci2: command 0x0419 tx timeout [ 1597.564667][ T10] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 1603.377546][ T22] ================================================================== [ 1603.385819][ T22] BUG: KASAN: use-after-free in __d_alloc+0x19a/0x950 [ 1603.392684][ T22] Read of size 5 at addr ffff88807a6c3320 by task kdevtmpfs/22 [ 1603.400249][ T22] [ 1603.402598][ T22] CPU: 0 PID: 22 Comm: kdevtmpfs Not tainted 5.14.0-syzkaller #0 [ 1603.410324][ T22] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1603.420377][ T22] Call Trace: [ 1603.423647][ T22] dump_stack_lvl+0xcd/0x134 [ 1603.428243][ T22] print_address_description.constprop.0.cold+0x6c/0x309 [ 1603.435315][ T22] ? __d_alloc+0x19a/0x950 [ 1603.439740][ T22] ? __d_alloc+0x19a/0x950 [ 1603.444165][ T22] kasan_report.cold+0x83/0xdf [ 1603.448931][ T22] ? __d_alloc+0x19a/0x950 [ 1603.453377][ T22] kasan_check_range+0x13d/0x180 [ 1603.458329][ T22] memcpy+0x20/0x60 [ 1603.462129][ T22] __d_alloc+0x19a/0x950 [ 1603.466808][ T22] d_alloc+0x4a/0x230 [ 1603.470799][ T22] __lookup_hash+0xc8/0x180 [ 1603.475301][ T22] kern_path_locked+0x17e/0x320 [ 1603.480160][ T22] ? filename_lookup+0x80/0x80 [ 1603.484917][ T22] handle_remove+0xa2/0x5fe [ 1603.489537][ T22] ? cacheinfo_cpu_online.cold+0x3e/0x3e [ 1603.495254][ T22] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 1603.501253][ T22] ? finish_task_switch.isra.0+0x232/0xa50 [ 1603.507118][ T22] ? find_held_lock+0x2d/0x110 [ 1603.511877][ T22] ? devtmpfsd+0xaa/0x2a3 [ 1603.516239][ T22] ? lock_downgrade+0x6e0/0x6e0 [ 1603.521100][ T22] ? do_raw_spin_lock+0x120/0x2b0 [ 1603.526134][ T22] ? rwlock_bug.part.0+0x90/0x90 [ 1603.531068][ T22] devtmpfsd+0x1b9/0x2a3 [ 1603.535309][ T22] ? dmar_validate_one_drhd+0x24d/0x24d [ 1603.540877][ T22] kthread+0x3e5/0x4d0 [ 1603.545016][ T22] ? set_kthread_struct+0x130/0x130 [ 1603.550205][ T22] ret_from_fork+0x1f/0x30 [ 1603.554651][ T22] [ 1603.556968][ T22] Allocated by task 22: [ 1603.561101][ T22] kasan_save_stack+0x1b/0x40 [ 1603.565786][ T22] __kasan_slab_alloc+0x83/0xb0 [ 1603.570621][ T22] kmem_cache_alloc+0x285/0x4a0 [ 1603.575466][ T22] getname_kernel+0x4e/0x370 [ 1603.580062][ T22] kern_path_locked+0x71/0x320 [ 1603.584813][ T22] handle_remove+0xa2/0x5fe [ 1603.589305][ T22] devtmpfsd+0x1b9/0x2a3 [ 1603.593536][ T22] kthread+0x3e5/0x4d0 [ 1603.597613][ T22] ret_from_fork+0x1f/0x30 [ 1603.602021][ T22] [ 1603.604337][ T22] Freed by task 22: [ 1603.608137][ T22] kasan_save_stack+0x1b/0x40 [ 1603.612813][ T22] kasan_set_track+0x1c/0x30 [ 1603.617411][ T22] kasan_set_free_info+0x20/0x30 [ 1603.622335][ T22] __kasan_slab_free+0xff/0x130 [ 1603.627202][ T22] slab_free_freelist_hook+0xe3/0x250 [ 1603.632568][ T22] kmem_cache_free+0x8a/0x5b0 [ 1603.637263][ T22] putname.part.0+0xe1/0x120 [ 1603.641852][ T22] kern_path_locked+0xc2/0x320 [ 1603.646623][ T22] handle_remove+0xa2/0x5fe [ 1603.651143][ T22] devtmpfsd+0x1b9/0x2a3 [ 1603.655378][ T22] kthread+0x3e5/0x4d0 [ 1603.659467][ T22] ret_from_fork+0x1f/0x30 [ 1603.663873][ T22] [ 1603.666177][ T22] The buggy address belongs to the object at ffff88807a6c3300 [ 1603.666177][ T22] which belongs to the cache names_cache of size 4096 [ 1603.680564][ T22] The buggy address is located 32 bytes inside of [ 1603.680564][ T22] 4096-byte region [ffff88807a6c3300, ffff88807a6c4300) [ 1603.693839][ T22] The buggy address belongs to the page: [ 1603.699469][ T22] page:ffffea0001e9b000 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x7a6c0 [ 1603.709978][ T22] head:ffffea0001e9b000 order:3 compound_mapcount:0 compound_pincount:0 [ 1603.718297][ T22] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 1603.726379][ T22] raw: 00fff00000010200 ffffea0001016600 0000000300000003 ffff8881400063c0 [ 1603.734975][ T22] raw: 0000000000000000 0000000080070007 00000001ffffffff 0000000000000000 [ 1603.743576][ T22] page dumped because: kasan: bad access detected [ 1603.749973][ T22] page_owner tracks the page as allocated [ 1603.755679][ T22] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 18076, ts 1569598162836, free_ts 1568780344837 [ 1603.775228][ T22] get_page_from_freelist+0xa72/0x2f80 [ 1603.780719][ T22] __alloc_pages+0x1b2/0x500 [ 1603.785298][ T22] alloc_pages+0x1a7/0x300 [ 1603.789707][ T22] allocate_slab+0x32e/0x4b0 [ 1603.794280][ T22] ___slab_alloc+0x473/0x7b0 [ 1603.798851][ T22] __slab_alloc.constprop.0+0xa7/0xf0 [ 1603.804305][ T22] kmem_cache_alloc+0x3e1/0x4a0 [ 1603.809182][ T22] getname_flags.part.0+0x50/0x4f0 [ 1603.814287][ T22] getname_flags+0x9a/0xe0 [ 1603.818694][ T22] user_path_at_empty+0x2b/0x90 [ 1603.823547][ T22] vfs_statx+0x142/0x390 [ 1603.827806][ T22] __do_sys_newfstatat+0x96/0x120 [ 1603.832824][ T22] do_syscall_64+0x35/0xb0 [ 1603.837250][ T22] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1603.843169][ T22] page last free stack trace: [ 1603.847831][ T22] free_pcp_prepare+0x2c5/0x780 [ 1603.852676][ T22] free_unref_page+0x19/0x690 [ 1603.857364][ T22] unfreeze_partials+0x16c/0x1b0 [ 1603.862289][ T22] put_cpu_partial+0x13d/0x230 [ 1603.867054][ T22] qlist_free_all+0x5a/0xc0 [ 1603.871629][ T22] kasan_quarantine_reduce+0x180/0x200 [ 1603.877186][ T22] __kasan_slab_alloc+0x95/0xb0 [ 1603.882021][ T22] kmem_cache_alloc+0x285/0x4a0 [ 1603.886856][ T22] getname_flags.part.0+0x50/0x4f0 [ 1603.891965][ T22] getname_flags+0x9a/0xe0 [ 1603.896367][ T22] user_path_at_empty+0x2b/0x90 [ 1603.901216][ T22] __x64_sys_umount+0xf8/0x180 [ 1603.905972][ T22] do_syscall_64+0x35/0xb0 [ 1603.910386][ T22] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1603.916312][ T22] [ 1603.918635][ T22] Memory state around the buggy address: [ 1603.924266][ T22] ffff88807a6c3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1603.932338][ T22] ffff88807a6c3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1603.940402][ T22] >ffff88807a6c3300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1603.948448][ T22] ^ [ 1603.953637][ T22] ffff88807a6c3380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1603.961692][ T22] ffff88807a6c3400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1603.970183][ T22] ================================================================== [ 1603.978321][ T22] Disabling lock debugging due to kernel taint [ 1603.998952][ T22] Kernel panic - not syncing: panic_on_warn set ... [ 1604.005572][ T22] CPU: 1 PID: 22 Comm: kdevtmpfs Tainted: G B 5.14.0-syzkaller #0 [ 1604.014691][ T22] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1604.024744][ T22] Call Trace: [ 1604.028014][ T22] dump_stack_lvl+0xcd/0x134 [ 1604.032593][ T22] panic+0x2b0/0x6dd [ 1604.036528][ T22] ? __warn_printk+0xf3/0xf3 [ 1604.041100][ T22] ? preempt_schedule_common+0x59/0xc0 [ 1604.046592][ T22] ? __d_alloc+0x19a/0x950 [ 1604.050996][ T22] ? preempt_schedule_thunk+0x16/0x18 [ 1604.056352][ T22] ? trace_hardirqs_on+0x38/0x1c0 [ 1604.061466][ T22] ? trace_hardirqs_on+0x51/0x1c0 [ 1604.066475][ T22] ? __d_alloc+0x19a/0x950 [ 1604.070873][ T22] ? __d_alloc+0x19a/0x950 [ 1604.075270][ T22] end_report.cold+0x63/0x6f [ 1604.079842][ T22] kasan_report.cold+0x71/0xdf [ 1604.084684][ T22] ? __d_alloc+0x19a/0x950 [ 1604.092320][ T22] kasan_check_range+0x13d/0x180 [ 1604.097309][ T22] memcpy+0x20/0x60 [ 1604.101266][ T22] __d_alloc+0x19a/0x950 [ 1604.105498][ T22] d_alloc+0x4a/0x230 [ 1604.109496][ T22] __lookup_hash+0xc8/0x180 [ 1604.114003][ T22] kern_path_locked+0x17e/0x320 [ 1604.118857][ T22] ? filename_lookup+0x80/0x80 [ 1604.123626][ T22] handle_remove+0xa2/0x5fe [ 1604.128128][ T22] ? cacheinfo_cpu_online.cold+0x3e/0x3e [ 1604.133753][ T22] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 1604.139719][ T22] ? finish_task_switch.isra.0+0x232/0xa50 [ 1604.145514][ T22] ? find_held_lock+0x2d/0x110 [ 1604.150260][ T22] ? devtmpfsd+0xaa/0x2a3 [ 1604.154572][ T22] ? lock_downgrade+0x6e0/0x6e0 [ 1604.159418][ T22] ? do_raw_spin_lock+0x120/0x2b0 [ 1604.164599][ T22] ? rwlock_bug.part.0+0x90/0x90 [ 1604.169785][ T22] devtmpfsd+0x1b9/0x2a3 [ 1604.174116][ T22] ? dmar_validate_one_drhd+0x24d/0x24d [ 1604.179760][ T22] kthread+0x3e5/0x4d0 [ 1604.183828][ T22] ? set_kthread_struct+0x130/0x130 [ 1604.189122][ T22] ret_from_fork+0x1f/0x30 [ 1604.193829][ T22] Kernel Offset: disabled [ 1604.198225][ T22] Rebooting in 86400 seconds..