, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x127) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r2, &(0x7f0000000100)='syz0\x00', 0x1ff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r2, 0x10}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000040)=r3, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:34:38 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x500, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:38 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00f04000630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x248}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x127) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r1, &(0x7f0000000100)='syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:34:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3e980], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:38 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x68, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 1987.614693][ T26] audit: type=1804 audit(1567690478.229:2009): pid=9063 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2876/memory.events" dev="sda1" ino=17153 res=1 13:34:38 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0xff07000000000000, 0x3c000000) 13:34:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x600, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:38 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3ea00], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:38 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffffe0ff4000630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x1ff) r1 = openat$cgroup(r0, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:34:38 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x74, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x700, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:39 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11020, 0x0, 0xffffffff, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x10000000000, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0xe, 0xfffffffffffffff9, 0x8001, 0x7ff, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x5, 0x3}, 0x3c) r5 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r5, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r5, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r5, &(0x7f000000b880)={&(0x7f000000b700)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f000000b800)=[{&(0x7f000000b780)=""/53, 0x35}, {&(0x7f000000b7c0)=""/9, 0x9}], 0x2, &(0x7f000000b840)=""/33, 0x21}, 0x2) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r7, &(0x7f0000000100)='syz0\x00', 0x1ff) bpf$MAP_CREATE(0x0, &(0x7f000000b8c0)={0xe, 0x8000, 0x0, 0x401, 0x0, r4, 0x0, [], r6, r7, 0x1, 0x4}, 0x3c) perf_event_open$cgroup(&(0x7f0000000400)={0x4, 0x70, 0x8, 0x10001, 0x1, 0x101, 0x0, 0x1, 0x40, 0x2, 0x428ebf48, 0x8000, 0x2, 0x3, 0x3, 0x5, 0x4, 0x6, 0x5191c966, 0xd9, 0x7f, 0x0, 0x6f, 0x1, 0x9, 0x4, 0x1000, 0x7, 0x4, 0x2, 0x4, 0x8, 0x1358, 0xfb, 0x2, 0x7, 0x6e, 0xfffffffffffffffb, 0x0, 0xfff, 0x1, @perf_bp={&(0x7f00000003c0), 0x4}, 0x1, 0x4, 0x6, 0x2, 0x3, 0x4, 0x2}, r3, 0x4, 0xffffffffffffffff, 0x7) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={r1}) r9 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000380)=r9, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={r8}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r10 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r10, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r10, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) sendmsg$inet(r10, &(0x7f0000001980)={&(0x7f0000000500)={0x2, 0x4e24, @local}, 0x10, &(0x7f0000001900)=[{&(0x7f0000000540)="95a9148d6579bdd802c940e3381af92c9a8393316406ad2ebaa9dcc730cb704e22e6bacfa95f2bd55892a221efa4c2b56f5f0a093c3b1cdc66950460ff76b872db36685e53b092d5b4a5fd3c48f45a9ddacf16814b301847918dea9dbc6886f6f7e8b985fe537c926a6dc155072038e23f9d780ff9abbbb286bd62e1fa0eb3aa4767886975cc87f4203987b665158e8634263a13000de20fa1034a6ef458eb99fd43e932770e0f59b96e00569131f2f20161e12942d3d5b83dfa0ba8110d1afc08b76dc652b66d779a41f3db9d4a982bc7", 0xd1}, {&(0x7f0000000640)="02df4cb5cc7a7773c82aafddab3df5534b2ecc8592e395a95cbe85df739059755cb8b50ef1c98e6da0f0b8afb41a4e7b2b511ec30cba86bb435cfeeff56eb68d036f8b369c11622d52ca3eccbe2d0c992efc99af8fef0791e6bcbae86f1960fda3fca1d397f9b85f0f75cc5715ebb32878b051fd1a56d52ab10f8bbb5033fafe8503ffe77549f181f21d98473771c43379634e188880b47af51c98eac1", 0x9d}, {&(0x7f0000000700)="ce15c994acd24a33f67d9fe7046a26788e768c03b1fa72b28fb1ddca4fbfc5eb56ab664cb482afa398c098bc3295bf8c9fb5bc11b25256af1348025562a179a2537c3b9d91fea2dc19aa6216ef78f4dbeb4110", 0x53}, {&(0x7f0000000780)="fc4b51c4902825ece6a6e20e035fbccb95d1fb571cdef378cba31f844b10d615b9e49af514a81a73a14145852a616771ebc2e7818650a646d4f494af8ad421552fe3ffdc8c7cdca8bfa3dc5b68a5f090594bf7eac44b025322a19757e0fc2c1a6cb84eb2d31c78d676ac6972b97ec1e94a0f10d158731fa817756ceedf4f36f6", 0x80}, {&(0x7f0000000800)="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", 0x1000}, {&(0x7f0000001800)="712a2796933cefa769f91a528bd298b2ce933fc1fa574820528ab085683df1d07752a7ab0e63439579089ce09c58860196618420b743a7a4343270fea2a9cc833efb3abfef8c13c0c29e100de403056014dc5031d6e71fda93406452372434e9fcf7a06f05c8e941d69575ab4b76ddb144483916793da7082b7ad9dae872c8334a2dc73a93fe21db352c26", 0x8b}, {&(0x7f00000018c0)="a456bded4995bed8c086150357387d71070abb", 0x13}], 0x7}, 0x20000000) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)="928863b15e1003d6d4ad27dc7abaafb05c1765bbd39ed2a4ee0480eeab962b85a670679f867c296be9794d69ec0e8ad8f990277f32c43e904ab1be5bea58edb6e4bf228b8431c1a4b171189bafcfbf1859c1ba738baee6f1083083a04b4fd35a63f171f7d2d892faf3fc24c67bc1e78503ed034c131d535796d9ab478f6292a22e32c9ebba8ed3029f03a1d47e6f0a825a3022b8738dd6c3fbaad2e3a258eea954bc4103cf72ed71f6b048459c4b9f36fc675d45b5234bc43ae7fb52f9c97ed899525771572fd285bf", 0xc9}], 0x1}, 0x8000) [ 1988.394342][ T26] audit: type=1804 audit(1567690479.009:2010): pid=9108 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2877/memory.events" dev="sda1" ino=17137 res=1 13:34:39 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00000300630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3ea80], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:39 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0xff0f000000000000, 0x3c000000) 13:34:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xa00, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:39 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xec, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r2}, 0xc) close(r3) close(r3) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:34:39 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00000500630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3eb00], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x1300, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:39 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x1a0, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:34:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3eb80], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:39 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00000600630477fbac141414e9", 0x0, 0x100}, 0x28) [ 1989.287400][ T26] audit: type=1804 audit(1567690479.899:2011): pid=9154 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2878/memory.events" dev="sda1" ino=17073 res=1 13:34:40 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0xffefffff00000000, 0x3c000000) 13:34:40 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x300, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x4800, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x3c) socketpair(0x17, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x127) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$kcm(0xa, 0x3, 0x11) socket$kcm(0x29, 0x7, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r3, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r3, &(0x7f00000013c0)={&(0x7f0000000080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/93, 0x5d}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/88, 0x58}], 0x3, &(0x7f0000001380)=""/5, 0x5}, 0x400120a3) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r4 = openat$cgroup_ro(r1, &(0x7f0000001400)='cpuset.effective_cpus\x00', 0x0, 0x0) mkdirat$cgroup(r4, &(0x7f0000000100)='syz0\x00', 0x1ff) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000000)=r4, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r5, &(0x7f0000000100)='syz0\x00', 0x1ff) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r6, &(0x7f0000000100)='syz0\x00', 0x1ff) openat$tun(0xffffffffffffff9c, &(0x7f0000001480)='/dev/net/tun\x00', 0x4427f3caf139aafc, 0x0) ioctl$TUNSETSTEERINGEBPF(r5, 0x800454e0, &(0x7f0000001440)=r6) 13:34:40 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00000700630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3ec00], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c00, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:40 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x500, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x6800, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:40 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00000900630477fbac141414e9", 0x0, 0x100}, 0x28) [ 1990.124761][ T26] audit: type=1804 audit(1567690480.739:2012): pid=9197 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2879/memory.events" dev="sda1" ino=17281 res=1 13:34:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3ec80], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:40 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x600, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:41 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0xffffff7f00000000, 0x3c000000) 13:34:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:34:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c00, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x700, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:41 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00000a00630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3ed00], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x7400, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xa00, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:34:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3ed80], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a00, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x1300, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 1991.038081][ T26] audit: type=1804 audit(1567690481.649:2013): pid=9251 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2880/memory.events" dev="sda1" ino=16595 res=1 13:34:42 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0xffffffff00000000, 0x3c000000) 13:34:42 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00000b00630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:42 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xec00, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0xffffffffffffffff, 0x8, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0xfffd, 0x9, 0x0, r0}, 0x3c) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x44, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000080)={'sit0\x00', @broadcast}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000100)='syz0\x00', 0x1ff) r4 = getpid() perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x8000, 0x7ff, 0x10001, 0x3, 0x0, 0x1, 0x4020, 0x2, 0x3, 0x800004, 0x3ff, 0x1f, 0x2, 0x2, 0x41, 0x3, 0x1b, 0x3f, 0x800, 0x1, 0x7, 0x0, 0x8, 0x8000, 0x81, 0x40, 0x0, 0xff, 0x9, 0x7fffffff, 0x0, 0x7, 0x2, 0x0, 0x7f, 0x3f, 0x0, 0x2, 0x2, @perf_config_ext={0x14f7e000000, 0x4}, 0x20, 0x7, 0x3, 0x0, 0x6, 0x1, 0x8}, r4, 0xf, 0xffffffffffffffff, 0x3502d7672789941a) socketpair(0x1, 0x9, 0x9fc3, &(0x7f00000002c0)) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge0\x00', @dev={[], 0x1e}}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r5, &(0x7f0000000100)='syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0xffffffffffff7fff, 0x8, 0x0, 0x9, 0x0, 0xffff, 0x10080, 0x1, 0x9, 0x3, 0x9, 0x400, 0x80000001, 0x6f19, 0xce, 0xffff, 0x3, 0x7, 0x3ff, 0x8, 0x80000000, 0x101, 0x4, 0x9, 0x912b, 0xfffffffffffffffc, 0x8, 0x3, 0x7fffffff, 0x3ff, 0xfff, 0x3, 0x3, 0x2, 0xfffffffffffffff9, 0xffffffff, 0x0, 0x10000, 0x6, @perf_bp={&(0x7f00000000c0), 0x5}, 0x2c8, 0xa, 0x2, 0x6, 0x3, 0x5c49, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x3) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000000140)='memory.swap.current\x00', 0x0, 0x0) openat$cgroup_ro(r7, &(0x7f0000000300)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r8, &(0x7f0000000100)='syz0\x00', 0x1ff) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={r8, 0x10, 0x1, 0x10000, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:34:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3ee00], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000a0, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:42 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x4800, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3ee80], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 1991.820245][ T26] audit: type=1804 audit(1567690482.429:2014): pid=9291 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2881/memory.events" dev="sda1" ino=17409 res=1 13:34:42 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00000c00630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:43 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0xffffffffa0008000, 0x3c000000) 13:34:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c00, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x28, &(0x7f0000000040)}, 0x10) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x202000, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000005080)={0x10, 0x3, &(0x7f00000009c0)=ANY=[@ANYBLOB="0303fcff0500b2fb96a1f00c97e7548e7e0052a83360e7cb86be8832b942"], 0x0, 0x2, 0xf3, &(0x7f0000001340)=""/243, 0x410fe, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f00000041c0)={&(0x7f0000003d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000040c0)=[{&(0x7f0000003d80)=""/160, 0xa0}, {&(0x7f0000003e40)=""/44, 0x2c}, {&(0x7f0000003e80)=""/217, 0xd9}, {&(0x7f0000004040)=""/57, 0x39}, {0x0}], 0x5, &(0x7f0000004140)=""/95, 0x5f}, 0x41) bpf$MAP_CREATE(0x0, &(0x7f0000004200)={0x7, 0x80, 0x80000001, 0x0, 0x18b, 0x1, 0x400, [], r5, r4, 0x5, 0x3}, 0x3c) recvmsg$kcm(r4, &(0x7f000000d880)={&(0x7f000000d5c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f000000d800)=[{&(0x7f000000d640)=""/34, 0x22}, {&(0x7f000000d680)=""/170, 0xaa}, {0x0}], 0x3, &(0x7f000000d840)=""/21, 0x15}, 0x2000) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f000000d8c0)=r6) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xbc, 0xbc, 0x7, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x7}]}, @fwd={0x5}, @struct={0x4, 0x2, 0x0, 0x4, 0x0, 0xb03a, [{0x4, 0x4, 0x4}, {0x8, 0x3, 0x47}]}, @const={0xb, 0x0, 0x0, 0xa, 0x4}, @typedef={0xb, 0x0, 0x0, 0x8, 0x4}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x2d, 0x0, 0x6b, 0x4}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x4, 0xffffffffffffff6e}}, @enum={0xb, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x5}]}, @union={0x7, 0x2, 0x0, 0x5, 0x8, 0x7, [{0x4, 0x2, 0xffffffff}, {0x7, 0x5, 0x200}]}]}, {0x0, [0x3684530c1495aaf3, 0x61, 0x61, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/20, 0xdb, 0x14, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xe, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x10000}, [@exit, @ldst={0x0, 0x1, 0xd16ac82853b9912a, 0xb, 0x4, 0x50, 0x4}]}, &(0x7f0000000240)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000005100)=""/4096, 0xe2680, 0x1, [], r5, 0x12, r8, 0x8, &(0x7f0000000480)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x5, 0x9, 0x8, 0x1}, 0x10}, 0x70) mkdirat$cgroup(r7, &(0x7f0000000100)='syz0\x00', 0x1ff) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x17, 0x4, 0x10001, 0x3, 0xb, r1, 0x4, [], r6, r7, 0x3, 0x4}, 0x3c) r10 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r10, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r10, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r10, &(0x7f00000026c0)={&(0x7f0000002280)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000025c0)=[{&(0x7f0000002300)=""/185, 0xb9}, {&(0x7f00000023c0)=""/231, 0xe7}, {&(0x7f00000024c0)=""/172, 0xac}, {&(0x7f0000002580)=""/62, 0x3e}], 0x4, &(0x7f0000002600)=""/147, 0x93}, 0x2020) bpf$PROG_LOAD(0x5, &(0x7f0000002780)={0xb, 0x3, &(0x7f0000000040)=@raw=[@ldst={0x5, 0x1, 0x1, 0x0, 0x7, 0x20, 0x1}, @map={0x18, 0xf, 0x1, 0x0, r9}], &(0x7f0000000080)='GPL\x00', 0x401, 0x9b, &(0x7f00000000c0)=""/155, 0x41100, 0xf, [], r11, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000002700)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000002740)={0x4, 0x2, 0x10001, 0x4}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:34:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3ef00], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:43 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00000d00630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x3000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x6800, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r1, &(0x7f0000000100)='syz0\x00', 0x1ff) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:34:43 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00000e00630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c00, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3ef80], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 1992.671372][ T26] audit: type=1804 audit(1567690483.279:2015): pid=9337 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2882/memory.events" dev="sda1" ino=17745 res=1 13:34:43 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0xffffffffa0010000, 0x3c000000) 13:34:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x7400, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:43 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00000f00630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x127) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:34:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3f000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x5000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a00, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3f080], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) r2 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, [@jmp={0x5, 0x7fffffff, 0x6, 0x0, 0xa, 0x180, 0xfffffffffffffffc}]}, &(0x7f0000000040)='syzkaller\x00', 0x8e4, 0x0, 0x0, 0x455ab188c2c252bf, 0x4, [], 0x0, 0x1, r2, 0x8, &(0x7f00000000c0)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0xb, 0x1000, 0x7c5}, 0x10}, 0x70) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:34:44 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00001100630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xec00, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:44 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0xffffffffffffffff, 0x3c000000) 13:34:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000a0, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x7000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3f100], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:44 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00001200630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x9, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x35) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:34:44 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x7000000) 13:34:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3f180], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:34:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x3000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xa000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 1994.303087][ T26] audit: type=1804 audit(1567690484.919:2016): pid=9445 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2885/memory.events" dev="sda1" ino=16622 res=1 13:34:45 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00001300630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x10000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r0, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg(r0, &(0x7f0000005400)={&(0x7f0000002f40)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000004380)=[{&(0x7f0000002fc0)=""/93, 0x5d}, {&(0x7f0000003040)=""/69, 0x45}, {&(0x7f00000030c0)=""/223, 0xdf}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/95, 0x5f}, {&(0x7f0000004240)}, {&(0x7f0000004280)=""/102, 0x66}, {&(0x7f0000004300)=""/107, 0x6b}], 0x8, &(0x7f0000004400)=""/4096, 0x1000}, 0x10242) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x18, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0xffffffffffffffff}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) socketpair(0x5, 0x800, 0x1, &(0x7f0000000000)) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r3, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r4 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r4, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000040)={r4}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$kcm(0x29, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:34:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3f200], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:45 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x9000000) 13:34:45 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00001400630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x5000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x13000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3f280], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:34:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x40000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff762cd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x3, 0x1}, 0x0, 0x0, 0x9e, 0x0, 0x0, 0x800000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:34:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x48000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:46 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00001500630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3f300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 1995.413763][ T26] audit: type=1804 audit(1567690486.029:2017): pid=9515 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2886/memory.events" dev="sda1" ino=17697 res=1 13:34:46 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x1c000000) 13:34:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x7000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:46 executing program 5: socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r1, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r1, &(0x7f0000000140)={&(0x7f00000001c0)=@xdp, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000240)=""/216, 0xd8}], 0x1, &(0x7f0000000380)=""/129, 0x81}, 0x10120) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r2, &(0x7f0000000100)='syz0\x00', 0x1ff) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000480)={0x0, 0xffffffffffffffff, 0xb, 0x1}, 0x14) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000100)='syz0\x00', 0x1ff) mkdirat$cgroup(r3, &(0x7f0000000440)='syz0\x00', 0x1ff) r4 = openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r5, &(0x7f0000000100)='syz0\x00', 0x1ff) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000040)=r5, 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:34:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3f380], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:46 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00001600630477fbac141414e9", 0x0, 0x100}, 0x28) [ 1995.922220][ T26] audit: type=1804 audit(1567690486.539:2018): pid=9515 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2886/memory.events" dev="sda1" ino=17697 res=1 13:34:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x68000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:34:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3f400], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:46 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00001700630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 1996.322419][ T26] audit: type=1804 audit(1567690486.939:2019): pid=9564 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2887/memory.events" dev="sda1" ino=16620 res=1 13:34:47 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x1d000000) 13:34:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xa000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x74000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x127) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000540)={r1, r2, 0x5, 0x1}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000100)='syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='/\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r4, &(0x7f0000000100)='syz0\x00', 0x1ff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r3, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x540f, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x5, 0x1}, 0x0, 0x0, &(0x7f0000000200)={0x4, 0xf, 0x1, 0x1}, &(0x7f0000000240)=0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x2}}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r6, &(0x7f0000000100)='syz0\x00', 0x1ff) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0xd) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={r4, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=""/51, 0x33, r5}}, 0x10) 13:34:47 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00001800630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3f480], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x10000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r3, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) r5 = openat$tun(0xffffffffffffff9c, 0x0, 0x202000, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000005080)={0x10, 0x3, &(0x7f00000009c0)=ANY=[@ANYBLOB="0303fcff0500b2fb96a1f00c97e7548e7e0052a83360e7cb86be8832b942"], 0x0, 0x2, 0xf3, &(0x7f0000001340)=""/243, 0x410fe, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) recvmsg$kcm(r6, &(0x7f00000041c0)={&(0x7f0000003d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000040c0)=[{&(0x7f0000003d80)=""/160, 0xa0}, {&(0x7f0000003e40)=""/44, 0x2c}, {&(0x7f0000003e80)=""/217, 0xd9}, {&(0x7f0000004040)=""/57, 0x39}, {0x0}], 0x5, &(0x7f0000004140)=""/95, 0x5f}, 0x41) bpf$MAP_CREATE(0x0, &(0x7f0000004200)={0x7, 0x80, 0x80000001, 0x0, 0x18b, 0x1, 0x400, [], r8, r7, 0x5, 0x3}, 0x3c) recvmsg$kcm(r7, &(0x7f000000d880)={&(0x7f000000d5c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f000000d800)=[{&(0x7f000000d640)=""/34, 0x22}, {&(0x7f000000d680)=""/170, 0xaa}, {0x0}], 0x3, &(0x7f000000d840)=""/21, 0x15}, 0x2000) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f000000d8c0)=r9) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r10, &(0x7f0000000100)='syz0\x00', 0x1ff) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x7, 0x7e02bf2, 0x8, 0x64a, 0xa9, r0, 0xffffffffe9097806, [], r9, r10, 0x0, 0x5}, 0x3c) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r4}, 0xc) close(r11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r11, 0x28}, 0x10) close(r3) r12 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r12, &(0x7f0000000100)='syz0\x00', 0x1ff) openat$cgroup_ro(r12, &(0x7f0000000300)='pids.current\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r2, &(0x7f0000000200)="e20913067614ab719a7bd33790cbeec80043380ae00c5296ce3e45a185f4e22cabb2014286094d2db6402288e88f426951b46e44925087dad623ac6d5b953f7ab95c14c438cd827133a6138c314dee7688b0f668fe4e664816cacca69f55262277c916a4f6c98c6ce92acf855033fa0f7f6b28c96dcc298a1b7c36dec7724905e8cbf231e2c790ac52cf59d7d3b57cdf459fd79d724c715d62e75555dbeb474424cb19e33044f34beb0d150eb810f29c961670723cbcf682acb2c3fcd0ec23807cd0248cb5fc", &(0x7f0000000380)=""/209}, 0x18) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:34:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3f500], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:47 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00024000630477fbac141414e9", 0x0, 0x100}, 0x28) [ 1997.075885][ T26] audit: type=1804 audit(1567690487.689:2020): pid=9606 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2888/memory.events" dev="sda1" ino=17905 res=1 13:34:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x13000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:48 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x1e000000) 13:34:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xa0008000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x40000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x3c) socketpair(0x34, 0x802, 0x17c, &(0x7f0000000000)) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:34:48 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00044000630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3f580], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xa0010000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x48000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:48 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff000a4000630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r1, &(0x7f0000000100)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r2, &(0x7f0000000100)='syz0\x00', 0x1ff) openat$cgroup_subtree(r2, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) 13:34:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xec000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3f600], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 1998.012966][ T26] audit: type=1804 audit(1567690488.629:2021): pid=9658 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2889/memory.events" dev="sda1" ino=17937 res=1 13:34:49 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x1f000000) 13:34:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x1a0ffffffff, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3f680], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:49 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff000e4000630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x3c) r0 = socket$kcm(0x29, 0x7, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r2, &(0x7f0000000100)='syz0\x00', 0x1ff) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000002740)={r1, r2}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000080)=""/117, 0x75}, {&(0x7f0000000100)=""/68, 0x44}, {&(0x7f0000000200)=""/43, 0x2b}], 0x3}, 0x8100) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:34:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x68000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000a0ffffffff, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r0, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg(r0, &(0x7f0000005400)={&(0x7f0000002f40)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000004380)=[{&(0x7f0000002fc0)=""/93, 0x5d}, {&(0x7f0000003040)=""/69, 0x45}, {&(0x7f00000030c0)=""/223, 0xdf}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/95, 0x5f}, {&(0x7f0000004240)}, {&(0x7f0000004280)=""/102, 0x66}, {&(0x7f0000004300)=""/107, 0x6b}], 0x8, &(0x7f0000004400)=""/4096, 0x1000}, 0x10242) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x18, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0xffffffffffffffff}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) socketpair(0x5, 0x800, 0x1, &(0x7f0000000000)) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r3, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r4 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r4, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000040)={r4}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$kcm(0x29, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:34:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x100000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 1998.767335][ T26] audit: type=1804 audit(1567690489.379:2022): pid=9702 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2890/memory.events" dev="sda1" ino=16620 res=1 13:34:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3f700], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:49 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x20000000) 13:34:49 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00604000630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x200000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x74000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r0, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg(r0, &(0x7f0000005400)={&(0x7f0000002f40)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000004380)=[{&(0x7f0000002fc0)=""/93, 0x5d}, {&(0x7f0000003040)=""/69, 0x45}, {&(0x7f00000030c0)=""/223, 0xdf}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/95, 0x5f}, {&(0x7f0000004240)}, {&(0x7f0000004280)=""/102, 0x66}, {&(0x7f0000004300)=""/107, 0x6b}], 0x8, &(0x7f0000004400)=""/4096, 0x1000}, 0x10242) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x18, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0xffffffffffffffff}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) socketpair(0x5, 0x800, 0x1, &(0x7f0000000000)) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r3, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r4 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r4, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000040)={r4}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$kcm(0x29, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:34:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3f780], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x300000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r0, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg(r0, &(0x7f0000005400)={&(0x7f0000002f40)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000004380)=[{&(0x7f0000002fc0)=""/93, 0x5d}, {&(0x7f0000003040)=""/69, 0x45}, {&(0x7f00000030c0)=""/223, 0xdf}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/95, 0x5f}, {&(0x7f0000004240)}, {&(0x7f0000004280)=""/102, 0x66}, {&(0x7f0000004300)=""/107, 0x6b}], 0x8, &(0x7f0000004400)=""/4096, 0x1000}, 0x10242) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x18, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0xffffffffffffffff}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) socketpair(0x5, 0x800, 0x1, &(0x7f0000000000)) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r3, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r4 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r4, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000040)={r4}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$kcm(0x29, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:34:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3f800], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x400000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:50 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00e04000630477fbac141414e9", 0x0, 0x100}, 0x28) [ 1999.608082][ T26] audit: type=1804 audit(1567690490.219:2023): pid=9744 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2891/memory.events" dev="sda1" ino=16644 res=1 13:34:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x500000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xa0008000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r0, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg(r0, &(0x7f0000005400)={&(0x7f0000002f40)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000004380)=[{&(0x7f0000002fc0)=""/93, 0x5d}, {&(0x7f0000003040)=""/69, 0x45}, {&(0x7f00000030c0)=""/223, 0xdf}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/95, 0x5f}, {&(0x7f0000004240)}, {&(0x7f0000004280)=""/102, 0x66}, {&(0x7f0000004300)=""/107, 0x6b}], 0x8, &(0x7f0000004400)=""/4096, 0x1000}, 0x10242) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x18, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0xffffffffffffffff}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) socketpair(0x5, 0x800, 0x1, &(0x7f0000000000)) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r3, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r4 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r4, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000040)={r4}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$kcm(0x29, 0x0, 0x0) 13:34:50 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00000200630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:50 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x21000000) 13:34:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3f880], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x600000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xa0010000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3f900], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:51 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00000300630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r0, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg(r0, &(0x7f0000005400)={&(0x7f0000002f40)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000004380)=[{&(0x7f0000002fc0)=""/93, 0x5d}, {&(0x7f0000003040)=""/69, 0x45}, {&(0x7f00000030c0)=""/223, 0xdf}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/95, 0x5f}, {&(0x7f0000004240)}, {&(0x7f0000004280)=""/102, 0x66}, {&(0x7f0000004300)=""/107, 0x6b}], 0x8, &(0x7f0000004400)=""/4096, 0x1000}, 0x10242) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x18, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0xffffffffffffffff}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) socketpair(0x5, 0x800, 0x1, &(0x7f0000000000)) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r3, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r4 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r4, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000040)={r4}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 13:34:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x700000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2000.483508][ T26] audit: type=1804 audit(1567690491.099:2024): pid=9793 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2892/memory.events" dev="sda1" ino=17924 res=1 13:34:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xec000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x800000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3f980], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r0, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg(r0, &(0x7f0000005400)={&(0x7f0000002f40)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000004380)=[{&(0x7f0000002fc0)=""/93, 0x5d}, {&(0x7f0000003040)=""/69, 0x45}, {&(0x7f00000030c0)=""/223, 0xdf}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/95, 0x5f}, {&(0x7f0000004240)}, {&(0x7f0000004280)=""/102, 0x66}, {&(0x7f0000004300)=""/107, 0x6b}], 0x8, &(0x7f0000004400)=""/4096, 0x1000}, 0x10242) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x18, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0xffffffffffffffff}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) socketpair(0x5, 0x800, 0x1, &(0x7f0000000000)) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r3, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r4 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r4, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000040)={r4}) 13:34:51 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x22000000) 13:34:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x1a0ffffffff, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:51 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00000400630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xa00000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3fa00], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r0, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg(r0, &(0x7f0000005400)={&(0x7f0000002f40)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000004380)=[{&(0x7f0000002fc0)=""/93, 0x5d}, {&(0x7f0000003040)=""/69, 0x45}, {&(0x7f00000030c0)=""/223, 0xdf}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/95, 0x5f}, {&(0x7f0000004240)}, {&(0x7f0000004280)=""/102, 0x66}, {&(0x7f0000004300)=""/107, 0x6b}], 0x8, &(0x7f0000004400)=""/4096, 0x1000}, 0x10242) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x18, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0xffffffffffffffff}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) socketpair(0x5, 0x800, 0x1, &(0x7f0000000000)) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r3, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r4 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x23, &(0x7f0000000280), 0xa8) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000040)={r4}) 13:34:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000a0ffffffff, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3fa80], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:52 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00000500630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r0, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg(r0, &(0x7f0000005400)={&(0x7f0000002f40)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000004380)=[{&(0x7f0000002fc0)=""/93, 0x5d}, {&(0x7f0000003040)=""/69, 0x45}, {&(0x7f00000030c0)=""/223, 0xdf}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/95, 0x5f}, {&(0x7f0000004240)}, {&(0x7f0000004280)=""/102, 0x66}, {&(0x7f0000004300)=""/107, 0x6b}], 0x8, &(0x7f0000004400)=""/4096, 0x1000}, 0x10242) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x18, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0xffffffffffffffff}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) socketpair(0x5, 0x800, 0x1, &(0x7f0000000000)) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r3, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r4 = socket$kcm(0xa, 0x3, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000040)={r4}) 13:34:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x1300000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2001.522383][ T26] audit: type=1804 audit(1567690492.139:2025): pid=9854 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2893/memory.events" dev="sda1" ino=17941 res=1 13:34:52 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x23000000) 13:34:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x100000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3fb00], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:52 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00000600630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r0, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg(r0, &(0x7f0000005400)={&(0x7f0000002f40)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000004380)=[{&(0x7f0000002fc0)=""/93, 0x5d}, {&(0x7f0000003040)=""/69, 0x45}, {&(0x7f00000030c0)=""/223, 0xdf}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/95, 0x5f}, {&(0x7f0000004240)}, {&(0x7f0000004280)=""/102, 0x66}, {&(0x7f0000004300)=""/107, 0x6b}], 0x8, &(0x7f0000004400)=""/4096, 0x1000}, 0x10242) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x18, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0xffffffffffffffff}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) socketpair(0x5, 0x800, 0x1, &(0x7f0000000000)) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r3, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000040)) [ 2002.094740][ T26] audit: type=1804 audit(1567690492.709:2026): pid=9854 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2893/memory.events" dev="sda1" ino=17941 res=1 13:34:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x4800000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x200000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r0, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg(r0, &(0x7f0000005400)={&(0x7f0000002f40)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000004380)=[{&(0x7f0000002fc0)=""/93, 0x5d}, {&(0x7f0000003040)=""/69, 0x45}, {&(0x7f00000030c0)=""/223, 0xdf}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/95, 0x5f}, {&(0x7f0000004240)}, {&(0x7f0000004280)=""/102, 0x66}, {&(0x7f0000004300)=""/107, 0x6b}], 0x8, &(0x7f0000004400)=""/4096, 0x1000}, 0x10242) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x18, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0xffffffffffffffff}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) socketpair(0x5, 0x800, 0x1, &(0x7f0000000000)) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x23, &(0x7f0000000280), 0xa8) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000040)) 13:34:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c00000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:53 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00000700630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3fb80], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2002.463994][ T26] audit: type=1804 audit(1567690493.079:2027): pid=9902 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2894/memory.events" dev="sda1" ino=16648 res=1 13:34:53 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x24000000) 13:34:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r0, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg(r0, &(0x7f0000005400)={&(0x7f0000002f40)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000004380)=[{&(0x7f0000002fc0)=""/93, 0x5d}, {&(0x7f0000003040)=""/69, 0x45}, {&(0x7f00000030c0)=""/223, 0xdf}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/95, 0x5f}, {&(0x7f0000004240)}, {&(0x7f0000004280)=""/102, 0x66}, {&(0x7f0000004300)=""/107, 0x6b}], 0x8, &(0x7f0000004400)=""/4096, 0x1000}, 0x10242) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x18, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0xffffffffffffffff}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) socketpair(0x5, 0x800, 0x1, &(0x7f0000000000)) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000040)) 13:34:53 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x300000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x6800000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x40000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:53 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00000800630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:53 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x400000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c00000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r0, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg(r0, &(0x7f0000005400)={&(0x7f0000002f40)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000004380)=[{&(0x7f0000002fc0)=""/93, 0x5d}, {&(0x7f0000003040)=""/69, 0x45}, {&(0x7f00000030c0)=""/223, 0xdf}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/95, 0x5f}, {&(0x7f0000004240)}, {&(0x7f0000004280)=""/102, 0x66}, {&(0x7f0000004300)=""/107, 0x6b}], 0x8, &(0x7f0000004400)=""/4096, 0x1000}, 0x10242) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x18, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0xffffffffffffffff}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) socketpair(0x5, 0x800, 0x1, &(0x7f0000000000)) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000040)) 13:34:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x7400000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:53 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00000900630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:53 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x500000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2003.331542][ T26] audit: type=1804 audit(1567690493.939:2028): pid=9952 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2895/memory.events" dev="sda1" ino=16620 res=1 13:34:54 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x25000000) 13:34:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x8000a0], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a00000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x600000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r0, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg(r0, &(0x7f0000005400)={&(0x7f0000002f40)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000004380)=[{&(0x7f0000002fc0)=""/93, 0x5d}, {&(0x7f0000003040)=""/69, 0x45}, {&(0x7f00000030c0)=""/223, 0xdf}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/95, 0x5f}, {&(0x7f0000004240)}, {&(0x7f0000004280)=""/102, 0x66}, {&(0x7f0000004300)=""/107, 0x6b}], 0x8, &(0x7f0000004400)=""/4096, 0x1000}, 0x10242) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x18, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0xffffffffffffffff}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) socketpair(0x5, 0x800, 0x1, &(0x7f0000000000)) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000040)) 13:34:54 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00000a00630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xec00000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x700000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffffffa0008000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r0, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg(r0, &(0x7f0000005400)={&(0x7f0000002f40)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000004380)=[{&(0x7f0000002fc0)=""/93, 0x5d}, {&(0x7f0000003040)=""/69, 0x45}, {&(0x7f00000030c0)=""/223, 0xdf}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/95, 0x5f}, {&(0x7f0000004240)}, {&(0x7f0000004280)=""/102, 0x66}, {&(0x7f0000004300)=""/107, 0x6b}], 0x8, &(0x7f0000004400)=""/4096, 0x1000}, 0x10242) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x18, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0xffffffffffffffff}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) socketpair(0x5, 0x800, 0x1, &(0x7f0000000000)) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000040)) 13:34:54 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00000b00630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x800000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2004.174100][ T26] audit: type=1804 audit(1567690494.789:2029): pid=9993 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2896/memory.events" dev="sda1" ino=16588 res=1 13:34:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffffffa0010000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xe70300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:55 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xa00000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r0, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg(r0, &(0x7f0000005400)={&(0x7f0000002f40)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000004380)=[{&(0x7f0000002fc0)=""/93, 0x5d}, {&(0x7f0000003040)=""/69, 0x45}, {&(0x7f00000030c0)=""/223, 0xdf}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/95, 0x5f}, {&(0x7f0000004240)}, {&(0x7f0000004280)=""/102, 0x66}, {&(0x7f0000004300)=""/107, 0x6b}], 0x8, &(0x7f0000004400)=""/4096, 0x1000}, 0x10242) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x18, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0xffffffffffffffff}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) socketpair(0x5, 0x800, 0x1, &(0x7f0000000000)) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) r3 = socket$kcm(0xa, 0x3, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000040)) 13:34:55 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x26000000) 13:34:55 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00000c00630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:55 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:55 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x1300000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r0, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg(r0, &(0x7f0000005400)={&(0x7f0000002f40)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000004380)=[{&(0x7f0000002fc0)=""/93, 0x5d}, {&(0x7f0000003040)=""/69, 0x45}, {&(0x7f00000030c0)=""/223, 0xdf}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/95, 0x5f}, {&(0x7f0000004240)}, {&(0x7f0000004280)=""/102, 0x66}, {&(0x7f0000004300)=""/107, 0x6b}], 0x8, &(0x7f0000004400)=""/4096, 0x1000}, 0x10242) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x18, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0xffffffffffffffff}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) socketpair(0x5, 0x800, 0x1, &(0x7f0000000000)) r2 = socket$kcm(0xa, 0x3, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000040)) [ 2005.031157][ T26] audit: type=1804 audit(1567690495.639:2030): pid=10037 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2897/memory.events" dev="sda1" ino=16594 res=1 13:34:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xe80300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:55 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r0, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg(r0, &(0x7f0000005400)={&(0x7f0000002f40)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000004380)=[{&(0x7f0000002fc0)=""/93, 0x5d}, {&(0x7f0000003040)=""/69, 0x45}, {&(0x7f00000030c0)=""/223, 0xdf}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/95, 0x5f}, {&(0x7f0000004240)}, {&(0x7f0000004280)=""/102, 0x66}, {&(0x7f0000004300)=""/107, 0x6b}], 0x8, &(0x7f0000004400)=""/4096, 0x1000}, 0x10242) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x18, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0xffffffffffffffff}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r2 = socket$kcm(0xa, 0x3, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000040)) 13:34:55 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00000d00630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:56 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x27000000) 13:34:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x4800000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xe90300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r0, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg(r0, &(0x7f0000005400)={&(0x7f0000002f40)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000004380)=[{&(0x7f0000002fc0)=""/93, 0x5d}, {&(0x7f0000003040)=""/69, 0x45}, {&(0x7f00000030c0)=""/223, 0xdf}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/95, 0x5f}, {&(0x7f0000004240)}, {&(0x7f0000004280)=""/102, 0x66}, {&(0x7f0000004300)=""/107, 0x6b}], 0x8, &(0x7f0000004400)=""/4096, 0x1000}, 0x10242) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x18, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0xffffffffffffffff}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000040)) 13:34:56 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00000e00630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c00000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r0, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg(r0, &(0x7f0000005400)={&(0x7f0000002f40)=@hci, 0x80, &(0x7f0000004380)=[{&(0x7f0000002fc0)=""/93, 0x5d}, {&(0x7f0000003040)=""/69, 0x45}, {&(0x7f00000030c0)=""/223, 0xdf}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/95, 0x5f}, {&(0x7f0000004240)}, {&(0x7f0000004280)=""/102, 0x66}, {&(0x7f0000004300)=""/107, 0x6b}], 0x8, &(0x7f0000004400)=""/4096, 0x1000}, 0x10242) r1 = socket$kcm(0xa, 0x3, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)) 13:34:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x6800000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xea0300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:56 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00000f00630477fbac141414e9", 0x0, 0x100}, 0x28) [ 2006.215805][ T26] audit: type=1804 audit(1567690496.829:2031): pid=10098 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2898/memory.events" dev="sda1" ino=16620 res=1 13:34:57 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x28000000) 13:34:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r0, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)) 13:34:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x13, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c00000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xeb0300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:57 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00001000630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x7400000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2f, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xa8) r1 = socket$kcm(0xa, 0x3, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)) 13:34:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x63, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a00000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2006.960012][ T26] audit: type=1804 audit(1567690497.569:2032): pid=10135 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2899/memory.events" dev="sda1" ino=17934 res=1 13:34:57 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00001100630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:58 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x29000000) 13:34:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xec0300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x3, 0x11) r0 = socket$kcm(0xa, 0x3, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)) 13:34:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xeb9f, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xec00000000000000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:58 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00001200630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffffffa0008000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5f5e0ff, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)) 13:34:58 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00001300630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xed0300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffffffa0010000, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2007.935096][ T26] audit: type=1804 audit(1567690498.549:2033): pid=10185 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2900/memory.events" dev="sda1" ino=18120 res=1 13:34:59 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x2a000000) 13:34:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20000321, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:59 executing program 5: r0 = socket$kcm(0xa, 0x3, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)) 13:34:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xee0300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:59 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00001400630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x8, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:59 executing program 5: r0 = socket$kcm(0xa, 0x3, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)) 13:34:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x9, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xef0300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2008.695821][ T26] audit: type=1804 audit(1567690499.309:2034): pid=10223 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2901/memory.events" dev="sda1" ino=16651 res=1 13:34:59 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x2b000000) 13:34:59 executing program 5: r0 = socket$kcm(0xa, 0x3, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)) 13:34:59 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00001500630477fbac141414e9", 0x0, 0x100}, 0x28) 13:34:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0xa, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:34:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xf00300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:34:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0xb, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:00 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)) 13:35:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x12, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xf10300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:00 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00001600630477fbac141414e9", 0x0, 0x100}, 0x28) [ 2009.568756][ T26] audit: type=1804 audit(1567690500.179:2035): pid=10264 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2902/memory.events" dev="sda1" ino=16651 res=1 13:35:00 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x2c000000) 13:35:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x13, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:00 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)) 13:35:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x13, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xf20300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:00 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00001700630477fbac141414e9", 0x0, 0x100}, 0x28) 13:35:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x2f, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:00 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)) 13:35:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2f, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x63, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xf30300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2010.344562][ T26] audit: type=1804 audit(1567690500.959:2036): pid=10307 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2903/memory.events" dev="sda1" ino=16611 res=1 13:35:01 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00001800630477fbac141414e9", 0x0, 0x100}, 0x28) 13:35:01 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x2d000000) 13:35:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)) 13:35:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x63, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0xeb9f, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xf40300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:01 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004002630477fbac141414e9", 0x0, 0x100}, 0x28) 13:35:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)) 13:35:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x5f5e0ff, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xeb9f, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x20000321, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)) 13:35:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5f5e0ff, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2011.161637][ T26] audit: type=1804 audit(1567690501.769:2037): pid=10355 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2904/memory.events" dev="sda1" ino=16580 res=1 13:35:02 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x2e000000) 13:35:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xf50300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:02 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004004630477fbac141414e9", 0x0, 0x100}, 0x28) 13:35:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)) 13:35:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20000321, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x8, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)) 13:35:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0xa, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xf60300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:02 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff0000400a630477fbac141414e9", 0x0, 0x100}, 0x28) 13:35:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)) [ 2011.925053][ T26] audit: type=1804 audit(1567690502.539:2038): pid=10395 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2905/memory.events" dev="sda1" ino=16595 res=1 13:35:03 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x2f000000) 13:35:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x9, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x2}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)) 13:35:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xf70300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:03 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff0000400e630477fbac141414e9", 0x0, 0x100}, 0x28) 13:35:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0xa, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x3}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0xb, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)) 13:35:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0xa}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:03 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004060630477fbac141414e9", 0x0, 0x100}, 0x28) [ 2012.711656][ T26] audit: type=1804 audit(1567690503.319:2039): pid=10438 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2906/memory.events" dev="sda1" ino=16697 res=1 13:35:03 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x30000000) 13:35:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xf80300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x3ee}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x12, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)) 13:35:03 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff000040e0630477fbac141414e9", 0x0, 0x100}, 0x28) 13:35:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x13, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x3f3}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x2f, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)) 13:35:04 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630677fbac141414e9", 0x0, 0x100}, 0x28) 13:35:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xf90300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2013.542054][ T26] audit: type=1804 audit(1567690504.159:2040): pid=10478 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2907/memory.events" dev="sda1" ino=16945 res=1 13:35:04 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x31000000) 13:35:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x3f4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x63, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)) 13:35:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xfa0300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:04 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000631177fbac141414e9", 0x0, 0x100}, 0x28) 13:35:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x3f5}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0xeb9f, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x3, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000040)) 13:35:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xfb0300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2014.411642][ T26] audit: type=1804 audit(1567690505.019:2041): pid=10526 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2908/memory.events" dev="sda1" ino=16945 res=1 13:35:05 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632177fbac141414e9", 0x0, 0x100}, 0x28) 13:35:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x3f6}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:05 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x32000000) 13:35:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x5f5e0ff, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x3, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000040)) 13:35:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x3f9}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x1000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:05 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632977fbac141414e9", 0x0, 0x100}, 0x28) 13:35:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x3fe}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x20000321, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x3, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000040)) 13:35:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2015.247893][ T26] audit: type=1804 audit(1567690505.859:2042): pid=10569 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2909/memory.events" dev="sda1" ino=17057 res=1 13:35:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0xffffff1f}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:06 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x33000000) 13:35:06 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632b77fbac141414e9", 0x0, 0x100}, 0x28) 13:35:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) 13:35:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x2}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x2010000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0xa, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x3}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x2}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) 13:35:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x2020000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x3}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:06 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632c77fbac141414e9", 0x0, 0x100}, 0x28) [ 2016.088308][ T26] audit: type=1804 audit(1567690506.699:2043): pid=10614 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2910/memory.events" dev="sda1" ino=17025 res=1 13:35:07 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x34000000) 13:35:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) 13:35:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0xa}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:07 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100}, 0x28) 13:35:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x2030000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x5}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x3ee}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:07 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x1000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x6}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:07 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633277fbac141414e9", 0x0, 0x100}, 0x28) 13:35:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x3f3}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2016.874382][ T26] audit: type=1804 audit(1567690507.489:2044): pid=10657 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2911/memory.events" dev="sda1" ino=17313 res=1 13:35:08 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x35000000) 13:35:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x7}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:08 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x2f000000) 13:35:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x3f4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:08 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100}, 0x28) 13:35:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x8}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x3f5}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3020000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:08 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633c77fbac141414e9", 0x0, 0x100}, 0x28) 13:35:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0xa}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x3f6}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2017.832440][ T26] audit: type=1804 audit(1567690508.449:2045): pid=10700 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2912/memory.events" dev="sda1" ino=17425 res=1 [ 2017.946841][ T26] audit: type=1804 audit(1567690508.479:2046): pid=10702 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir609066564/syzkaller.1H7a8y/4497/memory.events" dev="sda1" ino=17329 res=1 13:35:09 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x36000000) 13:35:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x10}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x4000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2018.402321][ T26] audit: type=1804 audit(1567690509.019:2047): pid=10693 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2912/memory.events" dev="sda1" ino=17425 res=1 13:35:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x3f9}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:09 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff0000400063e077fbac141414e9", 0x0, 0x100}, 0x28) 13:35:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x3fe}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x13}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x5000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0xffffff1f}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:09 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477e0ac141414e9", 0x0, 0x100}, 0x28) [ 2018.717202][ T26] audit: type=1804 audit(1567690509.329:2048): pid=10742 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2913/memory.events" dev="sda1" ino=16486 res=1 13:35:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x48}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x2}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x4c}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x6000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:10 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x37000000) 13:35:10 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fb4e141414e9", 0x0, 0x100}, 0x28) [ 2019.373765][ T26] audit: type=1804 audit(1567690509.989:2049): pid=10742 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2913/memory.events" dev="sda1" ino=16486 res=1 13:35:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x68}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x3}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x6c}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 13:35:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x7000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 13:35:10 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbace01414e9", 0x0, 0x100}, 0x28) 13:35:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x74}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2019.853815][ T26] audit: type=1804 audit(1567690510.469:2050): pid=10798 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2914/memory.events" dev="sda1" ino=17601 res=1 13:35:11 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x38000000) 13:35:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x5}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 13:35:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x8000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x7a}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:11 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac14e014e9", 0x0, 0x100}, 0x28) 13:35:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0xec}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x6}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={0x0, &(0x7f0000000280)=""/237, 0x0, 0xed, 0x1}, 0x20) 13:35:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x9000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x7}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:11 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac1414e0e9", 0x0, 0x100}, 0x28) [ 2020.753363][ T26] audit: type=1804 audit(1567690511.369:2051): pid=10849 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2915/memory.events" dev="sda1" ino=17569 res=1 13:35:11 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x39000000) 13:35:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x1a0}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={0x0, &(0x7f0000000280)=""/237, 0x0, 0xed, 0x1}, 0x20) 13:35:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x8}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xa000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:11 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x2}, 0x28) 13:35:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={0x0, &(0x7f0000000280)=""/237, 0x0, 0xed, 0x1}, 0x20) 13:35:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0xa}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:12 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x3}, 0x28) 13:35:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x300}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xb000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2021.563484][ T26] audit: type=1804 audit(1567690512.179:2052): pid=10887 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2916/memory.events" dev="sda1" ino=17665 res=1 13:35:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x1b, 0xed, 0x1}, 0x20) 13:35:12 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3a000000) 13:35:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x10}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:12 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x4}, 0x28) 13:35:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x500}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x1b, 0xed, 0x1}, 0x20) 13:35:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xc000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x1b, 0xed, 0x1}, 0x20) 13:35:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x600}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x13}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:12 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x5}, 0x28) 13:35:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xd000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2022.434058][ T26] audit: type=1804 audit(1567690513.049:2053): pid=10935 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2917/memory.events" dev="sda1" ino=17569 res=1 13:35:13 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3b000000) 13:35:13 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x48}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x700}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:13 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x6}, 0x28) 13:35:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var]}}, &(0x7f0000000280)=""/237, 0x2a, 0xed, 0x1}, 0x20) 13:35:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xe000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0xa00}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:13 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x4c}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:13 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x7}, 0x28) 13:35:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var]}}, &(0x7f0000000280)=""/237, 0x2a, 0xed, 0x1}, 0x20) 13:35:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x1300}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xf000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2023.227027][ T26] audit: type=1804 audit(1567690513.839:2054): pid=10976 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2918/memory.events" dev="sda1" ino=17601 res=1 13:35:14 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000002) 13:35:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x68}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:14 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x8}, 0x28) 13:35:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x4000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var]}}, &(0x7f0000000280)=""/237, 0x2a, 0xed, 0x1}, 0x20) 13:35:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x10000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x6c}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:14 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x9}, 0x28) 13:35:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x4800}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, 0x0, 0x2b, 0x0, 0x1}, 0x20) 13:35:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x11000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2024.045907][ T26] audit: type=1804 audit(1567690514.659:2055): pid=11021 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2919/memory.events" dev="sda1" ino=17457 res=1 13:35:15 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000003) 13:35:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x74}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, 0x0, 0x2b, 0x0, 0x1}, 0x20) 13:35:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x4c00}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:15 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0xa}, 0x28) 13:35:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x12000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, 0x0, 0x2b, 0x0, 0x1}, 0x20) 13:35:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x6800}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:15 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0xb}, 0x28) 13:35:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x7a}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x13000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x6c00}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2024.817858][ T26] audit: type=1804 audit(1567690515.429:2056): pid=11067 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2920/memory.events" dev="sda1" ino=16752 res=1 13:35:15 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000004) 13:35:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed}, 0x20) 13:35:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x7400}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:15 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0xc}, 0x28) 13:35:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0xec}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x14000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x1a0}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed}, 0x20) 13:35:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x7a00}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:16 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0xd}, 0x28) 13:35:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed}, 0x20) 13:35:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x300}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2025.640750][ T26] audit: type=1804 audit(1567690516.249:2057): pid=11111 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2921/memory.events" dev="sda1" ino=16736 res=1 13:35:16 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000005) 13:35:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x15000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:16 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r1, &(0x7f0000000100)='syz0\x00', 0x1ff) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r1}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x1) r4 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, r3, 0x0, 0x23, &(0x7f0000000140)='/{posix_acl_accessnodev,md5sumproc\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r4, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r5}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r4, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x1, 0x3f, 0x657, 0x3, 0x0, 0x9df5, 0x2020, 0x0, 0x7fff, 0x2, 0x3a1, 0x0, 0x3, 0x3, 0x8, 0x80, 0x3, 0x7ff, 0x6, 0x6, 0x3, 0xd3b0, 0x3, 0x7, 0x7fff, 0x6, 0x10001, 0x0, 0x80, 0xffffffffffffffd7, 0x1000, 0x1, 0x9, 0xe0e, 0x7ff, 0x9, 0x0, 0x7fffffff, 0x4, @perf_config_ext={0x2, 0x1}, 0x4, 0x734, 0x3, 0x2, 0x522, 0x0, 0x1}, r6, 0x6, r0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000003c0)='./cgroup.cpu/syz1\x00') mkdirat$cgroup(r7, &(0x7f0000000100)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYBLOB='\b\x00'/33]) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) 13:35:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0xec00}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x500}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:16 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0xe}, 0x28) 13:35:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x600}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x8000a0}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:16 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0xf}, 0x28) 13:35:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x700}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:17 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r1, &(0x7f0000000100)='syz0\x00', 0x1ff) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r1}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x1) r4 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, r3, 0x0, 0x23, &(0x7f0000000140)='/{posix_acl_accessnodev,md5sumproc\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r4, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r5}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r4, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x1, 0x3f, 0x657, 0x3, 0x0, 0x9df5, 0x2020, 0x0, 0x7fff, 0x2, 0x3a1, 0x0, 0x3, 0x3, 0x8, 0x80, 0x3, 0x7ff, 0x6, 0x6, 0x3, 0xd3b0, 0x3, 0x7, 0x7fff, 0x6, 0x10001, 0x0, 0x80, 0xffffffffffffffd7, 0x1000, 0x1, 0x9, 0xe0e, 0x7ff, 0x9, 0x0, 0x7fffffff, 0x4, @perf_config_ext={0x2, 0x1}, 0x4, 0x734, 0x3, 0x2, 0x522, 0x0, 0x1}, r6, 0x6, r0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000003c0)='./cgroup.cpu/syz1\x00') mkdirat$cgroup(r7, &(0x7f0000000100)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYBLOB='\b\x00'/33]) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) 13:35:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x16000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2026.367263][ T26] audit: type=1804 audit(1567690516.979:2058): pid=11145 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2922/memory.events" dev="sda1" ino=16752 res=1 13:35:17 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000006) 13:35:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x1000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0xa00}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:17 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x10}, 0x28) 13:35:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x17000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x3c) r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r0, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)={r1}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:35:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x2000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x1300}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:17 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x11}, 0x28) 13:35:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x38}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000021300)={&(0x7f0000021080)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000211c0)=[{&(0x7f0000021100)=""/187, 0xbb}], 0x1, &(0x7f0000021200)=""/232, 0xe8}, 0x40000040) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000021400)={&(0x7f0000021340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x4, [@int={0x1, 0x0, 0x0, 0x1, 0x0, 0x6e, 0x0, 0x59, 0x5}, @struct={0x7, 0x1, 0x0, 0x4, 0x675867a5, 0x2, [{0x2, 0x2, 0x775}]}]}, {0x0, [0x2f, 0x30]}}, &(0x7f00000213c0)=""/34, 0x44, 0x22}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000021440)={0xe, 0x800, 0x1, 0xfffffffffffffffa, 0x28, r1, 0x8, [], r2, r3, 0x2, 0x2}, 0x3c) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000005080)={0x10, 0x3, &(0x7f00000009c0)=ANY=[@ANYBLOB="0303fcff0500b2fb96a1f00c97e7548e7e0052a83360e7cb86be8832b942"], 0x0, 0x2, 0xf3, &(0x7f0000001340)=""/243, 0x410fe, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f00000041c0)={&(0x7f0000003d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000040c0)=[{&(0x7f0000003d80)=""/160, 0xa0}, {&(0x7f0000003e40)=""/44, 0x2c}, {&(0x7f0000003e80)=""/217, 0xd9}, {&(0x7f0000004040)=""/57, 0x39}, {0x0}], 0x5, &(0x7f0000004140)=""/95, 0x5f}, 0x41) bpf$MAP_CREATE(0x0, &(0x7f0000004200)={0x7, 0x80, 0x80000001, 0x0, 0x18b, 0x1, 0x400, [], r6, r5, 0x5, 0x3}, 0x3c) sendmsg(r0, &(0x7f00000002c0)={&(0x7f0000000080)=@hci={0x1f, r6, 0x2}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000100)="0d1cfa6b57eae90611e8724857f9d0028521df9de280d3441f8fba554410b944d3bd3810fc9cfb88315ede4f4cae2c37106f5f50b24287147947", 0x3a}, {&(0x7f0000000200)="ae48ac0acc82eabc8e59c3fff0b6d46cac692115d55604093f7c7a1b83ffa668f9b667b5cc1144932f0f873b35cda76d22b339710cecee526547cb2e688822d72bd2fc182fbfd907ccb85cdc08341b9673a1409e503ad5003a191596910020a6eccb317924df0b40206599186555f4c34ed0e2a8626cb87df15e2871ed240aaafd2b7a81123f73dae81773751a499643ae21457179a73e56e5", 0x99}], 0x2, &(0x7f0000000380)=[{0xb0, 0x104, 0x5, "f8bcf7852130ed1144cb7234c76d2c3edd6eb944589ce8646981dd1754a2f105b0e430ce8458c547524f826adab48e3681daa1c012c87f043e7d15d1a676c955d09dbb053fe2808523f6e25219841c95e5df07d3931deab3597f927c102d4035568d11c7ff3091701b38185c106ac244771f523364c4f1b7487da62babab942196fa711ea36ee87d8739260dc6791d03429a9541beb1bb2cf4f71bd2"}, {0x18, 0x104, 0x7fffffff, "5c83d2b4"}], 0xc8}, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 2027.147943][ T26] audit: type=1804 audit(1567690517.759:2059): pid=11186 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2923/memory.events" dev="sda1" ino=16751 res=1 13:35:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x3000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x18000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:18 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000007) 13:35:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x4000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:18 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x12}, 0x28) 13:35:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x4000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:18 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x1ff) r1 = perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x16, 0x9d6, 0x1, 0xab, 0x0, 0x5, 0x400, 0xc, 0x200, 0x8001, 0x9, 0xa9a, 0x0, 0x3, 0x4, 0x8, 0x7fff, 0x858c, 0x5, 0x3, 0x8, 0x9, 0x7, 0x435, 0x3, 0x7fffffff, 0x8, 0x3ff, 0x3, 0x7, 0x7, 0x4, 0x0, 0x1bd7, 0x4, 0x2, 0x0, 0x4, 0x3ad1a3d177e1039e, @perf_config_ext={0xfff, 0x9d}, 0x20000, 0x7ff, 0x5, 0x5, 0x5, 0x10000, 0x6}, 0xffffffffffffffff, 0x8, r0, 0x2) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ca, 0xf882, 0x0, 0x0, 0x0, 0x0, 0x2, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={0x0}, 0x17e6, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, r1, 0x9) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x4, 0x70, 0x1f, 0x8, 0x455, 0x10001, 0x0, 0xfffffffffffffff9, 0x850, 0x1, 0x8, 0x8, 0x1, 0xda1, 0x1, 0x2, 0x325a, 0x0, 0x8, 0xfffffffffffffc01, 0x6, 0x0, 0x1, 0x5, 0xe0, 0x0, 0x3, 0xff, 0x6, 0x1, 0x1ff, 0x1ffc00000, 0x0, 0x7, 0x0, 0xfffffffffffff84b, 0x8, 0xffffffffffffffd4, 0x0, 0x4, 0x2, @perf_config_ext={0x7, 0x1}, 0x2c044, 0xb318, 0x4, 0x5, 0xfc2b, 0x7, 0x1}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000080)='wlan0\x00') r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r3, 0x28, &(0x7f0000000040)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r3}, 0x3c) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x1) r5 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, r4, 0x0, 0x23, &(0x7f0000000140)='/{posix_acl_accessnodev,md5sumproc\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r6}, 0x30) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r7, &(0x7f0000000100)='syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x9, 0x5, 0x27, 0x0, 0xf84, 0x20, 0xb, 0x39c000, 0xffffffffffff9bfe, 0x3, 0x39, 0x4, 0x1, 0x9, 0x2, 0x5, 0xc3, 0x4, 0x100, 0x3f, 0xa0, 0xcb1f, 0x1, 0x10000, 0xffffffff, 0x6, 0x3, 0x1, 0x5, 0x3f, 0x10001, 0xfffffffffffffff9, 0x1, 0x17, 0x7, 0x0, 0x14bf2c8d, 0x1, @perf_config_ext={0x3, 0x7c}, 0x20000, 0xfffffffffffffff8, 0x9, 0x0, 0xfffffffffffff426, 0x0, 0x7}, r5, 0xb, r7, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:35:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x18010000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x4800}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x5000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x127) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={0xffffffffffffffff, 0x13, 0x1, 0xffff, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r1, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x202000, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000005080)={0x10, 0x3, &(0x7f00000009c0)=ANY=[@ANYBLOB="0303fcff0500b2fb96a1f00c97e7548e7e0052a83360e7cb86be8832b942"], 0x0, 0x2, 0xf3, &(0x7f0000001340)=""/243, 0x410fe, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x11, 0xa, 0x300) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r6 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r6, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r6, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r7 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r7, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r7, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg(r7, &(0x7f0000005040)={&(0x7f0000004c00)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000004f00)=[{&(0x7f0000004c80)=""/76, 0x4c}, {&(0x7f000000a100)=""/4096, 0x1000}, {&(0x7f0000004d00)=""/191, 0xbf}, {&(0x7f0000004dc0)=""/79, 0x4f}, {&(0x7f0000004e40)=""/30, 0x1e}, {&(0x7f0000004e80)=""/104, 0x68}], 0x6, &(0x7f0000004f80)=""/170, 0xaa}, 0x2000) sendmsg$sock(r6, &(0x7f00000004c0)={&(0x7f00000012c0)=@ll={0x11, 0xd, r8, 0x1, 0x1000, 0x6, @dev={[], 0x2a}}, 0x80, 0x0}, 0x40) recvmsg$kcm(r3, &(0x7f00000041c0)={&(0x7f0000003d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000040c0)=[{&(0x7f0000003d80)=""/160, 0xa0}, {&(0x7f0000003e40)=""/44, 0x2c}, {&(0x7f0000003e80)=""/217, 0xd9}, {&(0x7f0000004040)=""/57, 0x39}, {0x0}], 0x5, &(0x7f0000004140)=""/95, 0x5f}, 0x41) bpf$MAP_CREATE(0x0, &(0x7f0000004200)={0x7, 0x80, 0x80000001, 0x0, 0x18b, 0x1, 0x400, [], r9, r5, 0x5, 0x3}, 0x3c) recvmsg$kcm(r4, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x176}, 0x0) recvmsg$kcm(r5, &(0x7f000000d880)={&(0x7f000000d5c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f000000d800)=[{&(0x7f000000d640)=""/34, 0x22}, {&(0x7f000000d680)=""/170, 0xaa}, {0x0}], 0x3, &(0x7f000000d840)=""/21, 0x15}, 0x2000) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f000000d8c0)=r10) setsockopt$sock_attach_bpf(r4, 0x1, 0x1d, &(0x7f0000000100), 0x4) close(r4) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000940)={r4, r3}) ioctl$TUNSETIFINDEX(r2, 0x400454da, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000b40)={'irlan0\x00', 0x201}) recvmsg(r4, &(0x7f0000004b00)={&(0x7f00000045c0)=@hci={0x1f, 0x0}, 0x80, 0x0, 0x0, &(0x7f0000004a00)=""/242, 0xf2}, 0x100) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000980)=r11) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x19, 0x3, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}}, &(0x7f0000000200)='GPL\x00', 0xfffffffeffffffff, 0xc1, &(0x7f0000000240)=""/193, 0x41000, 0x0, [], r11, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x7, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x4, 0x3, 0x1, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000480)=r12, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r13, 0xc008240a, &(0x7f0000000040)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) 13:35:18 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x13}, 0x28) 13:35:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x1a030000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2027.984569][ T26] audit: type=1804 audit(1567690518.599:2060): pid=11231 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2924/memory.events" dev="sda1" ino=16769 res=1 13:35:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x4c00}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:19 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000008) 13:35:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x6000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:19 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x14}, 0x28) 13:35:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x6800}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:19 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x2800000000000000, 0x3c000000) 13:35:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x1c000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x7000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x6c00}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:19 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x15}, 0x28) 13:35:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x8000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x2a000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x7400}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2028.875292][ T26] audit: type=1804 audit(1567690519.489:2061): pid=11274 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir609066564/syzkaller.1H7a8y/4527/memory.events" dev="sda1" ino=16763 res=1 [ 2029.030777][ T26] audit: type=1804 audit(1567690519.519:2062): pid=11275 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2925/memory.events" dev="sda1" ino=16785 res=1 13:35:20 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000009) 13:35:20 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x16}, 0x28) 13:35:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0xa000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x7a00}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:20 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x2800000000000000, 0x3c000000) 13:35:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x2c030000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2029.459304][ T26] audit: type=1804 audit(1567690520.069:2063): pid=11275 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2925/memory.events" dev="sda1" ino=16785 res=1 13:35:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0xec00}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x10000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:20 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x17}, 0x28) [ 2029.674224][ T26] audit: type=1804 audit(1567690520.289:2064): pid=11315 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2926/memory.events" dev="sda1" ino=16881 res=1 13:35:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x8000a0}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x13000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x30030000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2029.967754][ T26] audit: type=1804 audit(1567690520.579:2065): pid=11330 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir609066564/syzkaller.1H7a8y/4528/memory.events" dev="sda1" ino=16728 res=1 [ 2030.437512][ T26] audit: type=1804 audit(1567690521.049:2066): pid=11311 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2926/memory.events" dev="sda1" ino=16881 res=1 13:35:21 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c00000a) 13:35:21 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x18}, 0x28) 13:35:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x1000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x40000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:21 executing program 5 (fault-call:0 fault-nth:0): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3f000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x48000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x2000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:21 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x19}, 0x28) 13:35:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x3000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2030.752018][ T26] audit: type=1804 audit(1567690521.369:2067): pid=11361 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2927/memory.events" dev="sda1" ino=16993 res=1 13:35:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x4c000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2030.847034][T11372] FAULT_INJECTION: forcing a failure. [ 2030.847034][T11372] name failslab, interval 1, probability 0, space 0, times 0 [ 2030.879222][T11372] CPU: 1 PID: 11372 Comm: syz-executor.5 Not tainted 5.3.0-rc3+ #0 [ 2030.887157][T11372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2030.897221][T11372] Call Trace: [ 2030.900558][T11372] dump_stack+0x172/0x1f0 [ 2030.904928][T11372] should_fail.cold+0xa/0x15 [ 2030.909536][T11372] ? fault_create_debugfs_attr+0x180/0x180 [ 2030.915477][T11372] ? ___might_sleep+0x163/0x280 [ 2030.920707][T11372] __should_failslab+0x121/0x190 [ 2030.925660][T11372] should_failslab+0x9/0x14 [ 2030.930176][T11372] kmem_cache_alloc_trace+0x2d3/0x790 [ 2030.935565][T11372] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2030.941947][T11372] ? refcount_sub_and_test_checked+0x154/0x200 [ 2030.948206][T11372] btf_new_fd+0x1e1/0x3150 [ 2030.952655][T11372] ? refcount_dec_and_test_checked+0x1b/0x20 [ 2030.958651][T11372] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2030.964904][T11372] ? apparmor_capable+0x2ed/0x630 [ 2030.969970][T11372] ? cap_capable+0x205/0x270 [ 2030.974665][T11372] ? btf_type_seq_show+0x1b0/0x1b0 [ 2030.979782][T11372] ? security_capable+0x95/0xc0 [ 2030.984632][T11372] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2030.984648][T11372] ? ns_capable_common+0x93/0x100 [ 2030.984667][T11372] __do_sys_bpf+0x132d/0x3350 [ 2030.984686][T11372] ? bpf_prog_load+0x1670/0x1670 [ 2030.984704][T11372] ? __kasan_check_write+0x14/0x20 [ 2031.010865][T11372] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2031.016442][T11372] ? wait_for_completion+0x440/0x440 [ 2031.021755][T11372] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2031.028035][T11372] ? fput_many+0x12c/0x1a0 [ 2031.032481][T11372] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2031.037943][T11372] ? do_syscall_64+0x26/0x6a0 [ 2031.042630][T11372] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2031.048710][T11372] ? do_syscall_64+0x26/0x6a0 [ 2031.053406][T11372] __x64_sys_bpf+0x73/0xb0 [ 2031.057945][T11372] do_syscall_64+0xfd/0x6a0 [ 2031.062458][T11372] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2031.062471][T11372] RIP: 0033:0x459879 [ 2031.062485][T11372] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:35:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x40000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2031.062497][T11372] RSP: 002b:00007f8d6694fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2031.100291][T11372] RAX: ffffffffffffffda RBX: 00007f8d6694fc90 RCX: 0000000000459879 [ 2031.108276][T11372] RDX: 0000000000000020 RSI: 0000000020000380 RDI: 0000000000000012 [ 2031.116275][T11372] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2031.124256][T11372] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8d669506d4 [ 2031.132341][T11372] R13: 00000000004bfaef R14: 00000000004d1780 R15: 0000000000000003 13:35:22 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c00000b) 13:35:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x68000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:22 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x4000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:22 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x1a}, 0x28) 13:35:22 executing program 5 (fault-call:0 fault-nth:1): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x40010000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:22 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x5000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2031.515470][T11398] FAULT_INJECTION: forcing a failure. [ 2031.515470][T11398] name failslab, interval 1, probability 0, space 0, times 0 [ 2031.576683][T11398] CPU: 1 PID: 11398 Comm: syz-executor.5 Not tainted 5.3.0-rc3+ #0 [ 2031.584979][T11398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2031.595051][T11398] Call Trace: [ 2031.598360][T11398] dump_stack+0x172/0x1f0 [ 2031.602745][T11398] should_fail.cold+0xa/0x15 [ 2031.607339][T11398] ? fault_create_debugfs_attr+0x180/0x180 [ 2031.613141][T11398] ? ___might_sleep+0x163/0x280 [ 2031.613164][T11398] __should_failslab+0x121/0x190 [ 2031.613183][T11398] should_failslab+0x9/0x14 [ 2031.613196][T11398] kmem_cache_alloc_trace+0x2d3/0x790 [ 2031.613218][T11398] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2031.639073][T11398] btf_new_fd+0x430/0x3150 [ 2031.643533][T11398] ? refcount_dec_and_test_checked+0x1b/0x20 [ 2031.649704][T11398] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2031.655966][T11398] ? apparmor_capable+0x2ed/0x630 [ 2031.660994][T11398] ? cap_capable+0x205/0x270 [ 2031.665588][T11398] ? btf_type_seq_show+0x1b0/0x1b0 [ 2031.665604][T11398] ? security_capable+0x95/0xc0 [ 2031.665625][T11398] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2031.665642][T11398] ? ns_capable_common+0x93/0x100 [ 2031.665663][T11398] __do_sys_bpf+0x132d/0x3350 [ 2031.691542][T11398] ? bpf_prog_load+0x1670/0x1670 [ 2031.696500][T11398] ? __kasan_check_write+0x14/0x20 [ 2031.696518][T11398] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2031.696538][T11398] ? wait_for_completion+0x440/0x440 [ 2031.712587][T11398] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2031.718845][T11398] ? fput_many+0x12c/0x1a0 [ 2031.723299][T11398] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2031.728773][T11398] ? do_syscall_64+0x26/0x6a0 [ 2031.733454][T11398] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2031.733469][T11398] ? do_syscall_64+0x26/0x6a0 [ 2031.733493][T11398] __x64_sys_bpf+0x73/0xb0 [ 2031.733509][T11398] do_syscall_64+0xfd/0x6a0 [ 2031.733528][T11398] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2031.733539][T11398] RIP: 0033:0x459879 13:35:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x6c000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:22 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x1b}, 0x28) 13:35:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x74000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2031.733557][T11398] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2031.782653][T11398] RSP: 002b:00007f8d6694fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2031.782668][T11398] RAX: ffffffffffffffda RBX: 00007f8d6694fc90 RCX: 0000000000459879 [ 2031.782677][T11398] RDX: 0000000000000020 RSI: 0000000020000380 RDI: 0000000000000012 [ 2031.782686][T11398] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2031.782696][T11398] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8d669506d4 [ 2031.782703][T11398] R13: 00000000004bfaef R14: 00000000004d1780 R15: 0000000000000003 13:35:22 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x6000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2031.848872][ T26] audit: type=1804 audit(1567690522.459:2068): pid=11407 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2928/memory.events" dev="sda1" ino=16746 res=1 13:35:22 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x1c}, 0x28) 13:35:22 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c00000c) 13:35:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x4a000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x7a000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:22 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x7000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:22 executing program 5 (fault-call:0 fault-nth:2): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:22 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x1d}, 0x28) 13:35:23 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0xa0008000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2032.415407][T11438] FAULT_INJECTION: forcing a failure. [ 2032.415407][T11438] name failslab, interval 1, probability 0, space 0, times 0 [ 2032.466536][T11438] CPU: 1 PID: 11438 Comm: syz-executor.5 Not tainted 5.3.0-rc3+ #0 [ 2032.474582][T11438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2032.484639][T11438] Call Trace: [ 2032.487941][T11438] dump_stack+0x172/0x1f0 [ 2032.492267][T11438] should_fail.cold+0xa/0x15 [ 2032.496988][T11438] ? fault_create_debugfs_attr+0x180/0x180 [ 2032.502784][T11438] ? ___might_sleep+0x163/0x280 [ 2032.507623][T11438] __should_failslab+0x121/0x190 [ 2032.512559][T11438] should_failslab+0x9/0x14 [ 2032.517051][T11438] kmem_cache_alloc_node_trace+0x274/0x750 [ 2032.522850][T11438] __kmalloc_node+0x3d/0x70 [ 2032.527347][T11438] kvmalloc_node+0x68/0x100 [ 2032.531849][T11438] btf_new_fd+0x47f/0x3150 [ 2032.536349][T11438] ? refcount_dec_and_test_checked+0x1b/0x20 [ 2032.542323][T11438] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2032.548583][T11438] ? apparmor_capable+0x2ed/0x630 [ 2032.553588][T11438] ? cap_capable+0x205/0x270 [ 2032.558161][T11438] ? btf_type_seq_show+0x1b0/0x1b0 [ 2032.563269][T11438] ? security_capable+0x95/0xc0 [ 2032.568109][T11438] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2032.574333][T11438] ? ns_capable_common+0x93/0x100 [ 2032.579361][T11438] __do_sys_bpf+0x132d/0x3350 [ 2032.584025][T11438] ? bpf_prog_load+0x1670/0x1670 [ 2032.588946][T11438] ? __kasan_check_write+0x14/0x20 [ 2032.594044][T11438] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2032.599592][T11438] ? wait_for_completion+0x440/0x440 [ 2032.604877][T11438] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2032.611102][T11438] ? fput_many+0x12c/0x1a0 [ 2032.615512][T11438] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2032.620953][T11438] ? do_syscall_64+0x26/0x6a0 [ 2032.625641][T11438] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2032.631778][T11438] ? do_syscall_64+0x26/0x6a0 [ 2032.636647][T11438] __x64_sys_bpf+0x73/0xb0 [ 2032.641051][T11438] do_syscall_64+0xfd/0x6a0 [ 2032.645541][T11438] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2032.651420][T11438] RIP: 0033:0x459879 [ 2032.655312][T11438] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2032.674987][T11438] RSP: 002b:00007f8d6694fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2032.683384][T11438] RAX: ffffffffffffffda RBX: 00007f8d6694fc90 RCX: 0000000000459879 [ 2032.691349][T11438] RDX: 0000000000000020 RSI: 0000000020000380 RDI: 0000000000000012 [ 2032.699307][T11438] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2032.707277][T11438] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8d669506d4 13:35:23 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x8000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:23 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x1e}, 0x28) [ 2032.715406][T11438] R13: 00000000004bfaef R14: 00000000004d1780 R15: 0000000000000003 13:35:23 executing program 5 (fault-call:0 fault-nth:3): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x4a010000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:23 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0xa0010000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2032.997809][ T26] audit: type=1804 audit(1567690523.609:2069): pid=11450 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2929/memory.events" dev="sda1" ino=16722 res=1 13:35:24 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c00000d) 13:35:24 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0xa000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:24 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x21}, 0x28) 13:35:24 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0xec000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x54000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:24 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x1a0ffffffff}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:24 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x10000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:24 executing program 5: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:24 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x22}, 0x28) 13:35:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x5c020000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2033.608409][ T26] audit: type=1804 audit(1567690524.219:2070): pid=11487 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2930/memory.events" dev="sda1" ino=17377 res=1 13:35:24 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x13000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:24 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c00000e) 13:35:24 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:24 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x8000a0ffffffff}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:24 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x23}, 0x28) 13:35:24 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x40000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x60030000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:24 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x100000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:24 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:25 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x48000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:25 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x24}, 0x28) 13:35:25 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x200000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x68020000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2034.685241][ T26] audit: type=1804 audit(1567690525.299:2071): pid=11540 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2931/memory.events" dev="sda1" ino=17425 res=1 13:35:25 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c00000f) 13:35:25 executing program 5: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:25 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x4c000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:25 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x25}, 0x28) 13:35:25 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x300000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x68030000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2035.043563][ T26] audit: type=1804 audit(1567690525.659:2072): pid=11540 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2931/memory.events" dev="sda1" ino=17425 res=1 13:35:25 executing program 5: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:25 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x400000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:25 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x68000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:25 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x26}, 0x28) 13:35:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x6a000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x500000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2035.436190][ T26] audit: type=1804 audit(1567690526.049:2073): pid=11581 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2932/memory.events" dev="sda1" ino=17409 res=1 13:35:26 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000010) 13:35:26 executing program 5: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:26 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x6c000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x600000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:26 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x27}, 0x28) 13:35:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x6a010000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:26 executing program 5: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:26 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x74000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:26 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x28}, 0x28) 13:35:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x700000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x6a020000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:26 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x7a000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2036.136295][ T26] audit: type=1804 audit(1567690526.749:2074): pid=11620 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2933/memory.events" dev="sda1" ino=17553 res=1 13:35:27 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x102}, 0x28) 13:35:27 executing program 5: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x800000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0xa0008000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:27 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000011) 13:35:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x6a030000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0xa00000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0xa0010000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:27 executing program 5: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x74010000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x1000000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0xec000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2036.923997][ T26] audit: type=1804 audit(1567690527.539:2075): pid=11663 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2934/memory.events" dev="sda1" ino=16961 res=1 13:35:27 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x104}, 0x28) 13:35:27 executing program 5: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x1300000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x1a0ffffffff}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:28 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000012) 13:35:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x74020000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x4000000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:28 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x10a}, 0x28) 13:35:28 executing program 5: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x8000a0ffffffff}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x4800000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:28 executing program 5: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x100000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:28 executing program 5: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x4c00000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x74030000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2037.949930][ T26] audit: type=1804 audit(1567690528.559:2076): pid=11720 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2935/memory.events" dev="sda1" ino=17505 res=1 13:35:29 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000013) 13:35:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x200000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:29 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x10e}, 0x28) 13:35:29 executing program 5: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x6800000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x80010000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:29 executing program 5: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x300000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x6c00000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x80020000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:29 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x160}, 0x28) 13:35:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x400000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2038.791897][ T26] audit: type=1804 audit(1567690529.409:2077): pid=11758 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2936/memory.events" dev="sda1" ino=16700 res=1 13:35:29 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000014) 13:35:29 executing program 5: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x7400000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x500000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:29 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x1e0}, 0x28) 13:35:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x80030000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x600000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:29 executing program 5: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x7a00000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x700000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x80e70300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2039.495977][ T26] audit: type=1804 audit(1567690530.109:2078): pid=11802 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2937/memory.events" dev="sda1" ino=16666 res=1 13:35:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0xec00000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:30 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000015) 13:35:30 executing program 5: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:30 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x500}, 0x28) 13:35:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x800000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0xffffffffa0008000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x80e80300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0xffffffffa0010000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:30 executing program 5: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0xa00000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x2}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:30 executing program 5: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x80e90300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2040.360040][ T26] audit: type=1804 audit(1567690530.969:2079): pid=11850 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2938/memory.events" dev="sda1" ino=16842 res=1 13:35:31 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000016) 13:35:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x1000000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x3}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:31 executing program 5: bpf$BPF_BTF_LOAD(0x17, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:31 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0xa00}, 0x28) 13:35:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x80ea0300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:31 executing program 5: bpf$BPF_BTF_LOAD(0x63, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x1300000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x80eb0300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x5}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x4000000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2041.261309][ T26] audit: type=1804 audit(1567690531.869:2080): pid=11889 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2939/memory.events" dev="sda1" ino=16847 res=1 13:35:32 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000017) 13:35:32 executing program 5: bpf$BPF_BTF_LOAD(0x5f5e0ff, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x6}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x4800000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x80ec0300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:32 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0xf00}, 0x28) 13:35:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x7}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x4c00000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x8}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x6800000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x80ed0300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2042.219238][ T26] audit: type=1804 audit(1567690532.829:2081): pid=11937 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2940/memory.events" dev="sda1" ino=16841 res=1 13:35:33 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000018) 13:35:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0xa}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x6c00000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x80ee0300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:33 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x2000}, 0x28) [ 2042.934362][ T26] audit: type=1804 audit(1567690533.549:2082): pid=11937 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2940/memory.events" dev="sda1" ino=16841 res=1 13:35:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x7400000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x10}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0xa, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x80ef0300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x3ee, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2043.221251][ T26] audit: type=1804 audit(1567690533.829:2083): pid=11980 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2941/memory.events" dev="sda1" ino=16867 res=1 13:35:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x7a00000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:34 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000019) 13:35:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x13}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x3f3, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x80f00300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:34 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0xec00000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:34 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x4000}, 0x28) 13:35:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x48}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x3f4, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:34 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0xffffffffa0008000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x4c}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x80f10300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x3f5, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2044.370401][ T26] audit: type=1804 audit(1567690534.979:2084): pid=12026 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2942/memory.events" dev="sda1" ino=16866 res=1 [ 2044.921617][ T26] audit: type=1804 audit(1567690535.529:2085): pid=12021 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2942/memory.events" dev="sda1" ino=16866 res=1 13:35:35 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c00001a) 13:35:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0xffffffffa0010000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x68}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x3f6, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x80f20300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:35 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0xe0ff}, 0x28) 13:35:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x6c}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x2}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0xffffff1f, 0x0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x74}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x80f30300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2045.258589][ T26] audit: type=1804 audit(1567690535.869:2086): pid=12068 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2943/memory.events" dev="sda1" ino=16867 res=1 13:35:36 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x3}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:36 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c00001b) 13:35:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x7a}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x80f40300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:36 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:36 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0x2}, 0x28) 13:35:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0xec}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:36 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x5}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x3, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x1a0}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x80f50300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x4, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2046.284677][ T26] audit: type=1804 audit(1567690536.899:2087): pid=12115 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2944/memory.events" dev="sda1" ino=16841 res=1 13:35:37 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c00001c) 13:35:37 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x6}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:37 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0x4}, 0x28) 13:35:37 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x300}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x5, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x80f60300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:37 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x500}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:37 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x7}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x6, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x80f70300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2046.998069][ T26] audit: type=1804 audit(1567690537.609:2088): pid=12152 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2945/memory.events" dev="sda1" ino=17873 res=1 13:35:37 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x600}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:37 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0xa}, 0x28) 13:35:38 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c00001d) 13:35:38 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x8}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x7, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x700}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:38 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0xe}, 0x28) 13:35:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x80f80300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x8, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:38 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0xa}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0xa00}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x80f90300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:38 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0x60}, 0x28) 13:35:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0xa, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2047.872259][ T26] audit: type=1804 audit(1567690538.489:2089): pid=12202 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2946/memory.events" dev="sda1" ino=16892 res=1 13:35:38 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c00001e) 13:35:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x1300}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:38 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x10}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x10, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x80fa0300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:39 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0xe0}, 0x28) 13:35:39 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x13}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x4000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x13, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x4800}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x80fb0300], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:39 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x48}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2048.643255][ T26] audit: type=1804 audit(1567690539.259:2090): pid=12239 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2947/memory.events" dev="sda1" ino=16936 res=1 13:35:39 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000021) 13:35:39 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0xf0}, 0x28) 13:35:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x48, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x4c00}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:39 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x4c}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x82000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:39 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x68}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x4c, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x6800}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x82010000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2049.356075][ T26] audit: type=1804 audit(1567690539.969:2091): pid=12281 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2948/memory.events" dev="sda1" ino=16935 res=1 13:35:40 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x6c}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x68, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:40 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000022) 13:35:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x6c00}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:40 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0x1a0}, 0x28) 13:35:40 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x74}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x6c, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x82020000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x74, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:40 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x7a}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x7400}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2050.120132][ T26] audit: type=1804 audit(1567690540.729:2092): pid=12324 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2949/memory.events" dev="sda1" ino=16935 res=1 13:35:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x7a00}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x82030000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:40 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0xa00}, 0x28) 13:35:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x7a, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0xec}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0xec00}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:41 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0xe00}, 0x28) 13:35:41 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000023) 13:35:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x8e020000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0xec, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x1a0}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x8000a0}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x1000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:41 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0xe5a}, 0x28) 13:35:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x1a0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x300}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x98000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2051.029113][ T26] audit: type=1804 audit(1567690541.639:2093): pid=12375 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2950/memory.events" dev="sda1" ino=16489 res=1 13:35:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x2000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x300, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:42 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000024) 13:35:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x3000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:42 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x500}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x500, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:42 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0xe72}, 0x28) 13:35:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x98010000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2051.675864][ T26] audit: type=1804 audit(1567690542.289:2094): pid=12375 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2950/memory.events" dev="sda1" ino=16489 res=1 13:35:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x600, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x4000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:42 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x600}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x700, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x5000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:42 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x700}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2052.011610][ T26] audit: type=1804 audit(1567690542.619:2095): pid=12425 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2951/memory.events" dev="sda1" ino=16856 res=1 13:35:43 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000025) 13:35:43 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0x2000}, 0x28) 13:35:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xa0008000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x6000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0xa00, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0xa00}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x1300, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x1300}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x7000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x4000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xa0010000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:43 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0x3f00}, 0x28) [ 2052.758581][ T26] audit: type=1804 audit(1567690543.369:2096): pid=12464 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2952/memory.events" dev="sda1" ino=16856 res=1 13:35:43 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000026) 13:35:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x4800}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x4000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x8000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:43 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0x4000}, 0x28) 13:35:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xa2020000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0xa000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x4800, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x4c00}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x10000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x4c00, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x6800}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2053.573821][ T26] audit: type=1804 audit(1567690544.189:2097): pid=12512 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2953/memory.events" dev="sda1" ino=16856 res=1 13:35:44 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000027) 13:35:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x6800, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xac020000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:44 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0x5a0e}, 0x28) 13:35:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x13000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x6c00}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x40000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x6c00, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x7400}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x7400, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x48000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xac030000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2054.372707][ T26] audit: type=1804 audit(1567690544.989:2098): pid=12551 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2954/memory.events" dev="sda1" ino=16896 res=1 13:35:45 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000028) 13:35:45 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0x6000}, 0x28) 13:35:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x7a00}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x4c000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x7a00, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xb0020000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0xec00, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0xec00}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x68000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xb0030000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x8000a0, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x8000a0}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2055.169996][ T26] audit: type=1804 audit(1567690545.779:2099): pid=12593 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2955/memory.events" dev="sda1" ino=16850 res=1 13:35:46 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000029) 13:35:46 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0x720e}, 0x28) 13:35:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x6c000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x1000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x1000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xb4010000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x74000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x2000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x2000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x7a000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xb6020000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2055.960910][ T26] audit: type=1804 audit(1567690546.569:2100): pid=12634 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2956/memory.events" dev="sda1" ino=16896 res=1 13:35:46 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0xe0ff}, 0x28) 13:35:47 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c00002a) 13:35:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x3000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x3000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0xa0008000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xc0030000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:47 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0xf000}, 0x28) 13:35:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0xa0010000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x4000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x4000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2056.718142][ T26] audit: type=1804 audit(1567690547.329:2101): pid=12674 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2957/memory.events" dev="sda1" ino=16705 res=1 13:35:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0xec000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x5000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xc8020000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:47 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c00002b) 13:35:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x5000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:47 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0xffe0}, 0x28) 13:35:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x1a0ffffffff}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x6000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xca000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x8000a0ffffffff}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x7000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x6000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:48 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0x8000a0}, 0x28) 13:35:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x8000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xcc010000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2057.579353][ T26] audit: type=1804 audit(1567690548.189:2102): pid=12717 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2958/memory.events" dev="sda1" ino=16960 res=1 13:35:48 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c00002c) 13:35:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x7000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x100000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0xa000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xd0030000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:48 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0xf0ffff}, 0x28) 13:35:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x200000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x8000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x10000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xd4000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0xa000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x300000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2058.383124][ T26] audit: type=1804 audit(1567690548.999:2103): pid=12760 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2959/memory.events" dev="sda1" ino=16960 res=1 13:35:49 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c00002d) 13:35:49 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0x1000000}, 0x28) 13:35:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x13000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x10000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x400000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xdc030000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x40000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x500000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x13000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:49 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0x2000000}, 0x28) 13:35:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x48000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xe0020000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2059.179590][ T26] audit: type=1804 audit(1567690549.789:2104): pid=12811 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2960/memory.events" dev="sda1" ino=16960 res=1 13:35:50 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c00002e) 13:35:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x40000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x600000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x4c000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xe6030000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:50 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0x4000000}, 0x28) 13:35:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x68000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x700000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x48000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x6c000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x800000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xe8010000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2059.978009][ T26] audit: type=1804 audit(1567690550.589:2105): pid=12850 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2961/memory.events" dev="sda1" ino=16705 res=1 13:35:51 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c00002f) 13:35:51 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0xa000000}, 0x28) 13:35:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x4c000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x74000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0xa00000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xe8020000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x7a000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x1000000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x68000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:51 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0xe000000}, 0x28) [ 2060.680091][ T26] audit: type=1804 audit(1567690551.289:2106): pid=12887 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2962/memory.events" dev="sda1" ino=17041 res=1 13:35:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0xa0008000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x1300000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:51 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000030) 13:35:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xe8030000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x6c000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0xa0010000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x4000000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:51 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0x20000000}, 0x28) 13:35:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x74000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x4800000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0xec000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x4c00000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xea000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x7a000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2061.589768][ T26] audit: type=1804 audit(1567690552.199:2107): pid=12936 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2963/memory.events" dev="sda1" ino=16991 res=1 13:35:52 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000031) 13:35:52 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0x3f000000}, 0x28) 13:35:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x1a0ffffffff}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x6800000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0xa0008000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xea010000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x8000a0ffffffff}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0xa0010000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x6c00000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xea020000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2062.294540][ T26] audit: type=1804 audit(1567690552.909:2108): pid=12973 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2964/memory.events" dev="sda1" ino=17089 res=1 13:35:53 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x100000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:53 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0x40000000}, 0x28) 13:35:53 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000032) 13:35:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x7400000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0xec000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:53 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x200000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xea030000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:53 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0x5a0e0000}, 0x28) 13:35:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x7a00000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x1a0ffffffff, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:53 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x300000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0xec00000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x8000a0ffffffff, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2063.157541][ T26] audit: type=1804 audit(1567690553.769:2109): pid=13020 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2965/memory.events" dev="sda1" ino=16910 res=1 13:35:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xf2020000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:54 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000033) 13:35:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x400000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:54 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0x60000000}, 0x28) 13:35:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0xffffffffa0008000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x100000000000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xf2030000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x500000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x200000000000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0xffffffffa0010000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xf4010000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x600000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0x3fe}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2063.983605][ T26] audit: type=1804 audit(1567690554.599:2110): pid=13063 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2966/memory.events" dev="sda1" ino=16982 res=1 13:35:55 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000034) 13:35:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x300000000000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:55 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0x720e0000}, 0x28) 13:35:55 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x700000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xf4020000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0x200002ca}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:55 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x800000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x400000000000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xf4030000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x3}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x500000000000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2064.799563][ T26] audit: type=1804 audit(1567690555.409:2111): pid=13105 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2967/memory.events" dev="sda1" ino=16982 res=1 13:35:55 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000035) 13:35:55 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0xa00000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:55 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0xa0008000}, 0x28) 13:35:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x600000000000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xfc030000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x1000000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x700000000000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x5}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x800000000000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x6}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2065.565989][ T26] audit: type=1804 audit(1567690556.179:2112): pid=13144 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2968/memory.events" dev="sda1" ino=17329 res=1 13:35:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x1a0ffffffff], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x1300000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:56 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0xa0010000}, 0x28) 13:35:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x7}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0xa00000000000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:56 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000036) 13:35:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x1000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x8}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x4000000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x1000000000000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x2000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0xa}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:57 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0xe0ffffff}, 0x28) [ 2066.322549][ T26] audit: type=1804 audit(1567690556.939:2113): pid=13184 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2969/memory.events" dev="sda1" ino=17265 res=1 13:35:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x1300000000000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x4800000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x10}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:57 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000037) 13:35:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x4000000000000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x4c00000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x13}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:57 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0xfeffffff}, 0x28) 13:35:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x4000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x48}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x6800000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x4800000000000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x8000a0ffffffff], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x4c}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x4c00000000000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2067.437164][ T26] audit: type=1804 audit(1567690558.049:2114): pid=13247 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2970/memory.events" dev="sda1" ino=17017 res=1 13:35:58 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000038) 13:35:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x6c00000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:58 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0xfffff000}, 0x28) 13:35:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x68}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x6800000000000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xe7030000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x6c}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x7400000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x6c00000000000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x74}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xe8030000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:58 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0xffffffe0}, 0x28) [ 2068.202051][ T26] audit: type=1804 audit(1567690558.819:2115): pid=13289 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2971/memory.events" dev="sda1" ino=17297 res=1 13:35:59 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000039) 13:35:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x7a00000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x7400000000000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x7a}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xe9030000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:35:59 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0xfffffffe}, 0x28) 13:35:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x7a00000000000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0xec}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0xec00000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0xffffffffa0008000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:35:59 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0x1a0ffffffff}, 0x28) 13:35:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0xec00000000000000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2068.913244][ T26] audit: type=1804 audit(1567690559.529:2116): pid=13327 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2972/memory.events" dev="sda1" ino=17569 res=1 13:36:00 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c00003a) 13:36:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xea030000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x1a0}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0xffffffffa0010000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0xffffffffa0008000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:00 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0x8000a0ffffffff}, 0x28) 13:36:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x300}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0xffffffffa0010000, 0x18, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0x3fe}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x9, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xeb030000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x500}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2069.801635][ T26] audit: type=1804 audit(1567690560.409:2117): pid=13374 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2973/memory.events" dev="sda1" ino=16901 res=1 13:36:00 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c00003b) 13:36:00 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0xf0ffffffffffff}, 0x28) 13:36:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0x200002ca}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0xa, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x600}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xec030000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x700}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x2b, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xed030000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0xa00}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x63, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2070.611583][ T26] audit: type=1804 audit(1567690561.219:2118): pid=13416 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2974/memory.events" dev="sda1" ino=16901 res=1 13:36:01 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c00003c) 13:36:01 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0x100000000000000}, 0x28) 13:36:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x3}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x1300}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xee030000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x5f5e0ff, 0x0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x4000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xef030000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:02 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0x200000000000000}, 0x28) [ 2071.396219][ T26] audit: type=1804 audit(1567690562.009:2119): pid=13457 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2975/memory.events" dev="sda1" ino=17553 res=1 13:36:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x4800}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:02 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000048) 13:36:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x3, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x5}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x4c00}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:02 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0x400000000000000}, 0x28) 13:36:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xf0030000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x6800}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x6}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xf1030000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2072.142310][ T26] audit: type=1804 audit(1567690562.759:2120): pid=13494 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2976/memory.events" dev="sda1" ino=17571 res=1 13:36:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x5, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x6c00}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:03 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c00004c) 13:36:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x7}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x7400}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:03 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0xa00000000000000}, 0x28) 13:36:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x6, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xf2030000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x8}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x7, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x7a00}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x8, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xf3030000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0xa}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2072.958635][ T26] audit: type=1804 audit(1567690563.569:2121): pid=13540 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2977/memory.events" dev="sda1" ino=17037 res=1 13:36:04 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000057) 13:36:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0xec00}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:04 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0xe00000000000000}, 0x28) 13:36:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xa, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x10}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xf4030000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x13}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x8000a0}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x10, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x48}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:04 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0x2000000000000000}, 0x28) 13:36:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xf5030000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2073.798250][ T26] audit: type=1804 audit(1567690564.409:2122): pid=13587 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2978/memory.events" dev="sda1" ino=17031 res=1 13:36:04 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000058) 13:36:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x1000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x13, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x4c}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:04 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0x3f00000000000000}, 0x28) 13:36:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xf6030000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x48, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x68}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x3000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xf7030000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:05 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0x4000000000000000}, 0x28) [ 2074.560501][ T26] audit: type=1804 audit(1567690565.169:2123): pid=13625 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2979/memory.events" dev="sda1" ino=17031 res=1 13:36:05 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000059) 13:36:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x6c}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x4000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xf8030000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:05 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0x5a0e000000000000}, 0x28) 13:36:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x74}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x5000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x68, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2075.320031][ T26] audit: type=1804 audit(1567690565.929:2124): pid=13666 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2980/memory.events" dev="sda1" ino=17809 res=1 13:36:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xf9030000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:06 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 13:36:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x7a}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:06 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c00005a) 13:36:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x6000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0xec}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:06 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0x720e000000000000}, 0x28) 13:36:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xfa030000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x1a0}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x7000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x74, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:06 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0xe0ffffffffffffff}, 0x28) 13:36:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xfb030000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x300}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2076.218369][ T26] audit: type=1804 audit(1567690566.829:2125): pid=13714 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2981/memory.events" dev="sda1" ino=16484 res=1 13:36:07 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000068) 13:36:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x8000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x500}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x100000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:07 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0xfeffffff00000000}, 0x28) 13:36:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0xa000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xec, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x600}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x200000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:07 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0xffffffff00000000}, 0x28) 13:36:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x10000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2077.061048][ T26] audit: type=1804 audit(1567690567.669:2126): pid=13763 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2982/memory.events" dev="sda1" ino=16979 res=1 13:36:08 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c00006c) 13:36:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x700}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x1a0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x13000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x201000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:08 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0xffffffffa0008000}, 0x28) 13:36:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0xa00}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x40000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x300, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x202000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x48000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:08 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0xffffffffa0010000}, 0x28) [ 2077.870649][ T26] audit: type=1804 audit(1567690568.479:2127): pid=13802 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2983/memory.events" dev="sda1" ino=18017 res=1 13:36:09 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000074) 13:36:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x500, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x1300}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x4c000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x203000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:09 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0xfffffffffffff000}, 0x28) 13:36:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x68000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x4000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x600, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x700, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x4800}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x6c000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2078.733553][ T26] audit: type=1804 audit(1567690569.339:2128): pid=13846 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2984/memory.events" dev="sda1" ino=17048 res=1 13:36:09 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c00007a) 13:36:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x300000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:09 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100, 0xffffffffffffffe0}, 0x28) 13:36:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x74000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xa00, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x4c00}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x7a000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x6800}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x1300, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x302000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:10 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100}, 0x70) [ 2079.584948][ T26] audit: type=1804 audit(1567690570.199:2129): pid=13888 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2985/memory.events" dev="sda1" ino=18097 res=1 13:36:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x6c00}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0xa0008000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x4800, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:10 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000300) 13:36:10 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100}, 0x200000a8) 13:36:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x400000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0xa0010000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c00, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:10 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xa, 0xe, &(0x7f0000000040)="3f0558a36d4f9f59352c", &(0x7f0000000140)=""/14, 0x800}, 0x28) r2 = getpid() r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000100)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000380)={0x1, 0x70, 0x4, 0x7, 0x1, 0x6f6, 0x0, 0x7fffffff, 0x21010, 0x4, 0x2, 0x400, 0x9, 0xffffffffffffffe1, 0x8, 0x5, 0x5, 0x8, 0xc300000000000, 0x47, 0x5, 0x7ff, 0x0, 0x10001, 0x2, 0x4, 0x87, 0x8fa, 0x8001, 0x2, 0x7, 0x5, 0x2, 0xfffffffffffffffa, 0x39da24e6, 0x7ff, 0x91, 0x9, 0x0, 0x10000, 0x5, @perf_config_ext={0x3f, 0xc}, 0x80c0, 0x1, 0x40800000000, 0x0, 0x7, 0x40, 0x10000}) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x1) r5 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, r4, 0x0, 0x23, &(0x7f0000000140)='/{posix_acl_accessnodev,md5sumproc\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r6}, 0x30) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r7, &(0x7f0000000100)='syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x40, 0x7fffffff, 0x0, 0x4, 0x0, 0x1, 0x4, 0x2, 0x4, 0x10000, 0xc7, 0x7, 0x7ff, 0x7fff, 0x5, 0x9, 0x7, 0x5, 0x4d1f80, 0xfffffffffffffff9, 0x100000001, 0xffffffffffffffff, 0x800, 0x1, 0xfffffffffffff000, 0x8, 0x0, 0x3, 0x7, 0x1ff, 0x0, 0x100000001, 0x6, 0x1ff, 0xffffffff, 0x3, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000001c0), 0x3}, 0x420, 0x8, 0x1, 0x7, 0x101, 0x5, 0x3ff}, r5, 0x6, r7, 0x8) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x80, 0x4fa7, 0x5, 0x81, 0x0, 0x3, 0x20010, 0x2, 0x6592, 0x3f, 0x40, 0x5, 0x71c6, 0xffffffffffffffff, 0x1, 0x3, 0x100, 0x800000000000, 0x1, 0xffffffffffffff79, 0xb, 0x4, 0x80000001, 0xffffffff, 0xf80000000000, 0x9, 0x3, 0x1, 0x6, 0x63a3, 0x100, 0x2, 0x5, 0x3, 0x8001, 0xffffffffffff2dbf, 0x0, 0x400, 0x3, @perf_config_ext={0xffffffff, 0x8000}, 0x6000, 0x3, 0x8, 0x9, 0x8000, 0x5, 0x4}, r2, 0xf, r1, 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100}, 0x28) 13:36:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x7400}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0xec000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x500000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x7a00}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x6800, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2080.407073][ T26] audit: type=1804 audit(1567690571.019:2130): pid=13935 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2986/memory.events" dev="sda1" ino=17044 res=1 13:36:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x1a0ffffffff}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0xec00}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:11 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000500) 13:36:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c00, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:11 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r2, &(0x7f0000000100)='syz0\x00', 0x1ff) openat$cgroup(r2, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100}, 0x28) 13:36:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x600000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x8000a0ffffffff}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x8000a0}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x7400, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x100000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x1000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:11 executing program 4: ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000040)) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100}, 0x28) 13:36:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x700000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a00, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2081.353899][ T26] audit: type=1804 audit(1567690571.969:2131): pid=13985 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2987/memory.events" dev="sda1" ino=17041 res=1 13:36:12 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000600) 13:36:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x200000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xec00, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x800000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:12 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100}, 0x28) 13:36:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x300000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x3000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000a0, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:12 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r1, &(0x7f0000000100)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x7ff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg(r2, &(0x7f000000bf80)={&(0x7f000000a880)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f000000be80)=[{&(0x7f000000a900)=""/88, 0x58}, {&(0x7f000000a980)=""/212, 0xd4}, {&(0x7f000000aa80)=""/252, 0xfc}, {&(0x7f000000ab80)=""/46, 0x2e}, {&(0x7f000000abc0)=""/211, 0xd3}, {&(0x7f000000acc0)=""/24, 0x18}, {&(0x7f000000ad00)=""/179, 0xb3}, {&(0x7f000000adc0)=""/4096, 0x1000}, {&(0x7f000000bdc0)=""/173, 0xad}], 0x9, &(0x7f000000bf40)=""/2, 0x2}, 0x40000000) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r4, &(0x7f0000000100)='syz0\x00', 0x1ff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0xd0, 0xfc, &(0x7f0000000580)="8f41ab498a7d21777ada10fca968b049b3edab8a3084e70b44caa99da2e0592c2f474d9244ad6cfd233ed4b0a31b32b785aaeaf45a25e0db2bedcb076c3ed26dcb2f1dbaca067e62e6df92211061dbee887e1af0e544b375954e7e0265158c71e6053e8eb4e842b0229caf0de1bfd0c4ff5a7ccfe9daea07d7daba89e6e8ae4ff12be5ff36a5947d90fddde6dcd4c248703e20e8bdb164d067ae5132685172f9262ca77a82309e8cb8d9bc31ba3f8c835776f8e0203fa84b8e6bca12f7016daadcec26070d50d07bb9aa3c532388c7f8", &(0x7f0000000680)=""/252, 0x3}, 0x28) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3a, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='s\x03\x12K\x03\x00\x00\x00\x00\x00\x00\x00Pyzkaller\x00\x8d&\x80\xe3/\x1f#\xe2\x04\xd2$\xa6\xcb\xb5!x\xa0z\xbe\xd88Z\xf7\x02\x8b\f\x03\xb7K{\xf4\n\xe2\x15\x1d8*\xd0\'\xeb\x1f/\x06\x001=:\x9a\xb4I\xc4\x82\x00\xb7\\[\x99\xb9\x83\xb6E\x18\x14\a\xc2\x87\x17\x92\x0e\xaa\\\x18p\x04\xf0`3\n\xc6\xdd\xd9\xfe\x18$\x10\xa3\xe0\xb2\xea\xf3Ya\x04!\xaf\xc1\xa50H1+\xe9/\x00N\xbf\xbb-\x96\'\xc1\xec\xe1wOK\xc1\'\xa8\xc0\x84v', 0x0, 0x0, 0x0, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000000000}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r5, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100}, 0x28) 13:36:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x900000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2082.063359][ T26] audit: type=1804 audit(1567690572.679:2132): pid=14024 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2988/memory.events" dev="sda1" ino=18183 res=1 13:36:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x4000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:13 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000700) 13:36:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x400000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:13 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0xfffffffffffffc73, 0x0, 0x0, 0x0, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0xfffffffffffffe5d}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100}, 0x28) 13:36:13 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x5000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xa00000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:13 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x6000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x500000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:13 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x28, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x100000000}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x7ff}, 0x270) 13:36:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xb00000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:13 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100}, 0x28) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000100)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f00000001c0)=0x3) mkdirat$cgroup(r2, &(0x7f0000000100)='syz0\x00', 0x1ff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000140)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', r2}, 0x10) [ 2082.905045][ T26] audit: type=1804 audit(1567690573.519:2133): pid=14073 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2989/memory.events" dev="sda1" ino=17082 res=1 13:36:14 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000900) 13:36:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x7000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x600000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x3000000, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xc00000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:14 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x1ff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x4e, 0xdf, &(0x7f0000000140)="5acdec3c553d9b9a2f974b99335d7cdbb11116210126f1b0fda8500d129749589fa43232e95bbfbdc02d7928ae24356572ccf59cb12383891fe2f6b1d29fa6588400efcf87527762f4b6c5ba726e", &(0x7f0000000380)=""/223, 0xf74}, 0x28) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100}, 0x28) 13:36:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x700000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x8000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xd00000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:14 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000005080)={0x10, 0x3, &(0x7f00000009c0)=ANY=[@ANYBLOB="0303fcff0500b2fb96a1f00c97e7548e7e0052a83360e7cb86be8832b942"], 0x0, 0x2, 0xf3, &(0x7f0000001340)=""/243, 0x410fe, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000041c0)={&(0x7f0000003d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000040c0)=[{&(0x7f0000003d80)=""/160, 0xa0}, {&(0x7f0000003e40)=""/44, 0x2c}, {&(0x7f0000003e80)=""/217, 0x7b}, {&(0x7f0000004040)=""/57, 0x39}, {0x0}], 0x5, &(0x7f0000004140)=""/95, 0xffffffffffffffe6}, 0x41) bpf$MAP_CREATE(0x0, &(0x7f0000004200)={0x7, 0x80, 0x80000001, 0x0, 0x18b, 0x1, 0x400, [], r4, r3, 0x5, 0x3}, 0x3c) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r5, &(0x7f0000000100)='syz0\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x9, 0xa, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, [@exit, @ldst={0x5c5219d6b94a9b7f, 0x2, 0x1, 0x3, 0x3, 0xffffffffffffffc0, 0x10}, @call={0x85, 0x0, 0x0, 0x6d}, @jmp={0x5, 0x8, 0x9, 0x9, 0xa, 0x10, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xf}]}, &(0x7f0000000040)='GPL\x00', 0x4, 0xb4, &(0x7f0000000280)=""/180, 0xfec14da5c9f4815d, 0x6, [], r4, 0x9, r5, 0x8, &(0x7f00000001c0)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x2, 0x4, 0x8, 0x15}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100}, 0x28) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r6, &(0x7f0000000100)='syz0\x00', 0x1ff) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r7, &(0x7f0000000100)='syz0\x00', 0x1ff) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000440)=r7) 13:36:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0xa000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2083.774602][ T26] audit: type=1804 audit(1567690574.389:2134): pid=14118 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2990/memory.events" dev="sda1" ino=17082 res=1 13:36:14 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000a00) 13:36:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x800000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x5000000, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x10000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:14 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000100)='syz0\x00', 0x1ff) perf_event_open$cgroup(&(0x7f0000000140)={0x2, 0x70, 0x2, 0x101, 0x1, 0x2, 0x0, 0x7, 0x11088, 0x8, 0x1, 0xcb, 0x4, 0x8, 0x1, 0x1, 0x9, 0x6, 0xfffffffffffffffd, 0x1, 0x48a8, 0x2, 0x6, 0x1f, 0xfffffffffffffb55, 0x3, 0x800, 0x2, 0x3f, 0xb, 0x4, 0x0, 0x4, 0xac, 0x3ff, 0x80000001, 0xf3, 0xaf8, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000040), 0x69b698fad40b7a3f}, 0x400, 0x400, 0xf28, 0x9, 0xfffffffffffff001, 0x1, 0x2}, r3, 0xc, r1, 0x4) 13:36:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xe00000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0xa00000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000000, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x13000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:15 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.current\x00', 0x0, 0x0) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x30}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000002c0)={r1, r3}) mkdirat$cgroup(r1, &(0x7f0000000100)='syz0\x00', 0x1ff) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000040)={'ip6tnl0\x00', @remote}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(r4, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100}, 0x28) 13:36:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0xf00000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x1000000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2084.529499][ T26] audit: type=1804 audit(1567690575.139:2135): pid=14155 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2991/memory.events" dev="sda1" ino=17101 res=1 13:36:15 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000b00) 13:36:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x7000000, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x1300000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x40000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x1000000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:15 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100}, 0x28) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000100)='syz0\x00', 0x1ff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='./cgroup.cpu/syz1\x00', r3}, 0x10) getpid() r4 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, r2, 0x0, 0x23, &(0x7f0000000140)='/{posix_acl_accessnodev,md5sumproc\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r4, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r5}, 0x30) socketpair(0x0, 0x1, 0x401, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r6, &(0x7f0000000580)={&(0x7f0000000380)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)="56b5217713e82c7216c0caba10c1de7413c3121ced4ca28141a098c77e6b4f86119fe53b866d9bbadb10accf56e39a33705d75e6be132b9769cbd4417a8f5611b4f8cb319409189e9a274e479232e0f7917cc5421c9360c4f9d21e48acb52c74c990c810fdf41a38d37bb131cb3978a842e3985d0d7f45e9089e05a067e8e20afe8225961d", 0x85}, {&(0x7f0000000400)="f06b588ea7ab339c21d90c887878e84380c3ccfe35af983387eb76c415d17d7ec150380dd582bea9b6", 0x29}], 0x2, &(0x7f00000007c0)=[{0x38, 0x110, 0x6, "533dbe7483942a23b88d2ca8a75e6f1de652503773eef8acb6ff5efe7ebe2e9f972a7d9c82d8"}, {0xc0, 0x102, 0x5, "5442e8e99dafb8a06b367aaebcb1d2f9dfcc389a8eeac9b60519bc4008d730e4f91f84ece68707ecf6c0c95c9b7643214d4477a77abfeda59d777b175552231bbf3696998fd8c1ca98d8211036fb2b322ef9a98a310cec5ed4f99c0e8f747cbaf0955746548a7baa11ad8ae639c47cb9affcd4467dd21e83441f6484415a0eedbd6d25c49c32a1fdf51d6b738db8ebc3fac91fbc10e9feefab8e8e0e25c5e8d90be76e512174ea0cfc85"}], 0xf8}, 0x2c0400c5) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x8, 0xfffffffffffffff9, 0x0, 0x62, 0x0, 0xffffffffffffffc1, 0x800, 0x2, 0x2, 0x2e, 0x3ff, 0xbf43, 0x81, 0x9, 0x315f04b, 0x3, 0x8, 0x8, 0xff, 0xfff, 0x8000, 0x1, 0x9, 0x1000, 0x2cc, 0x3, 0x7fffffff, 0x8, 0x0, 0x8001, 0x3, 0x3ff, 0xd21, 0x80, 0x303, 0x616, 0x0, 0xffffffff00000000, 0xb, @perf_bp={&(0x7f0000000040), 0xb}, 0x3920, 0x9, 0x3ff, 0xb104e1af4f5d1e48, 0x8, 0x2c64, 0xa54f}, r4, 0x9, 0xffffffffffffffff, 0x1) 13:36:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x48000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x4000000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000000, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x4c000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x4800000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:16 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r3, 0x28, &(0x7f0000000040)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0x2, &(0x7f0000000040)=@raw=[@map={0x18, 0xa, 0x1, 0x0, r3}], &(0x7f0000000140)='syzkaller\x00', 0xa9df, 0xac, &(0x7f0000000280)=""/172, 0x41100, 0x1, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x8, 0x1, 0x9}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100}, 0x28) [ 2085.485158][ T26] audit: type=1804 audit(1567690576.099:2136): pid=14201 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2992/memory.events" dev="sda1" ino=18200 res=1 13:36:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x1100000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xa000000, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x68000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x4c00000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:16 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000c00) 13:36:16 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000140)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000100)='syz0\x00', 0x1ff) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x8, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x200}, [@jmp={0x5, 0x1, 0x4, 0xa, 0x2, 0xffffffffffffffff, 0x3f}, @ldst={0x0, 0x3, 0x6, 0x5, 0xa, 0x20, 0xffffffffffffffff}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0xe1}]}, &(0x7f00000001c0)='syzkaller\x00', 0xb44, 0x75, &(0x7f0000000280)=""/117, 0x40f00, 0x6, [], 0x0, 0x6, r4, 0x8, &(0x7f0000000380)={0x4, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0x3, 0xe0, 0x55}, 0x10}, 0x70) 13:36:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x10000000, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x6800000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x6c000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x1200000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:16 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100}, 0x28) 13:36:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x74000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x6c00000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2086.301290][ T26] audit: type=1804 audit(1567690576.909:2137): pid=14250 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2993/memory.events" dev="sda1" ino=18216 res=1 13:36:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x13000000, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x7a000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x7400000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:17 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000d00) 13:36:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x40000000, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x1300000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0xa0008000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:17 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_all\x00', 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100}, 0x28) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f00000001c0)={&(0x7f0000000140)=@ipx, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000280)=""/81, 0x51}, {&(0x7f0000000380)=""/166, 0xa6}, {&(0x7f0000000440)=""/93, 0x5d}, {&(0x7f00000004c0)=""/254, 0xfe}, {&(0x7f00000005c0)=""/101, 0x65}, {&(0x7f0000000040)=""/56, 0x38}, {&(0x7f00000007c0)=""/205, 0xcd}, {&(0x7f00000008c0)=""/219, 0xdb}, {&(0x7f00000009c0)=""/200, 0xc8}], 0x9, &(0x7f0000000b80)=""/137, 0x89}, 0x40) 13:36:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x7a00000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x48000000, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0xa0010000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0xec00000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x1400000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0xec000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2087.243943][ T26] audit: type=1804 audit(1567690577.859:2138): pid=14302 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2994/memory.events" dev="sda1" ino=16977 res=1 13:36:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c000000, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:18 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000e00) 13:36:18 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r2}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r4, &(0x7f0000000100)='syz0\x00', 0x1ff) r5 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x5, 0x2, 0x3, 0x4, 0x0, 0x0, 0x20000, 0x1, 0x1, 0x800, 0x5f, 0x6, 0x0, 0x2, 0x200, 0x7ff, 0x5, 0x7, 0x0, 0x1, 0xd052, 0x12, 0x24, 0x0, 0x1, 0x7fffffff, 0x3f, 0x401, 0x1, 0x2, 0xffffffff, 0x4, 0x0, 0x8001, 0xfffffffffffffff7, 0x20, 0x0, 0x5, 0x1, @perf_config_ext={0x8000, 0x8}, 0x8, 0xfffffffffffff805, 0x1, 0x4, 0x5, 0x0, 0x4}, 0x0, 0xc, r4, 0x9496c1879fb4956e) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000280)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B') close(r3) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1, &(0x7f0000000040)=ANY=[@ANYPTR], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xfffffffffffffffc}, 0x8, 0x10, &(0x7f0000000000)={0x2, 0x0, 0x0, 0xfffffffffffffffc}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100}, 0x28) 13:36:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x1a0ffffffff}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x68000000, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0xffffffffa0008000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x1500000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0xffffffffa0010000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c000000, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x8000a0ffffffff}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:18 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100}, 0x28) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r2, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r3}, 0xc) close(r4) close(r4) 13:36:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x0, 0x2}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x100000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2088.076328][ T26] audit: type=1804 audit(1567690578.689:2139): pid=14348 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2995/memory.events" dev="sda1" ino=16993 res=1 13:36:19 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c000f00) 13:36:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x1600000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x74000000, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:19 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x8c000, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x14) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100}, 0x28) 13:36:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x0, 0x3}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x200000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x300000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a000000, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x400000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2088.800140][ T26] audit: type=1804 audit(1567690579.409:2140): pid=14386 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2996/memory.events" dev="sda1" ino=16977 res=1 13:36:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x0, 0x5}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x1700000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:19 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c001100) 13:36:19 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f00000002c0)={0xb, 0x70, 0x100, 0x5, 0x101, 0x4, 0x0, 0x8, 0x10, 0xc63cc7acf9ac30b8, 0x81, 0x9, 0xffffffffffffffff, 0x8001, 0x401, 0x800000000000000, 0x31c19c70, 0x3, 0x9d9, 0x2, 0x7, 0x1ff, 0x7f, 0x101, 0xfff, 0x7ff, 0x7fff, 0x8, 0xea, 0x8001, 0x9, 0x3, 0x3, 0x3ff, 0x1, 0x5, 0x7, 0x40, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000280), 0x8}, 0x4000, 0x2, 0x6, 0x2, 0x7, 0x3, 0x3100000000000000}, 0x0, 0x5, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x2, 0x6, 0x0, 0x7f, 0x0, 0x5, 0x84006, 0x8, 0x3ff, 0x8, 0x7f, 0x1, 0x5, 0x1c5d, 0x8, 0xffffffffffffffff, 0x2, 0x800, 0x0, 0xffffffffffffff01, 0x6, 0x9, 0x1f, 0x80, 0x100, 0x40, 0x101, 0x4, 0x1ff, 0xf736, 0x6, 0x3, 0x4, 0x4, 0x6, 0x3, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x21a00, 0x7, 0x81, 0x2, 0x3, 0x4, 0x2}, 0xffffffffffffffff, 0xc, r1, 0x9) r2 = gettid() perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0xfffffffffffffffa, 0x8, 0x60008990, 0x4a9, 0x0, 0x800, 0x6200c, 0x9, 0x7, 0x81, 0xeb92, 0x2, 0x8, 0x140, 0x9, 0x5, 0x2, 0x6, 0x1, 0xf6f2, 0x3, 0x7, 0x1, 0xfffffffffffffffe, 0x8001, 0x171, 0x1, 0xe9, 0x80, 0x0, 0x8, 0x80000001, 0xe20, 0x9, 0xade7, 0x0, 0x0, 0x100000001, 0x1, @perf_config_ext={0x9, 0x7fff}, 0x84, 0x8000, 0x3, 0x0, 0xc07, 0x8000, 0xfffffffffffffff8}, r2, 0x1, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000100)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0xfffffffffffffffd) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x28, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100}, 0x28) 13:36:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xa0008000, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x0, 0x6}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x500000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x1800000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x600000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x0, 0x7}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xa0010000, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:20 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100}, 0x28) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) r3 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, r2, 0x0, 0x23, &(0x7f0000000140)='/{posix_acl_accessnodev,md5sumproc\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r3, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r4}, 0x30) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r5, &(0x7f0000000100)='syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000001, 0x2, 0x9, 0xe0, 0x0, 0x7fff, 0x0, 0x1, 0x8, 0x83f, 0x2, 0x1000, 0x1, 0x8, 0x9e9, 0xb8e, 0x5, 0x5b, 0x401, 0x9, 0x6, 0x6, 0x8, 0x7f, 0xfffffffffffffffe, 0x0, 0x87, 0xffffffff851e9564, 0x6, 0x7fff, 0x1ff, 0x2, 0x3, 0x400, 0x7fff, 0x5, 0x0, 0x6, 0x1d21bb34f81686fc, @perf_config_ext={0x9, 0x5}, 0x2050d, 0x3, 0x0, 0x3, 0x7, 0x3ff, 0xffffffffffffc876}, r3, 0xe, r5, 0x8) 13:36:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x1801000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2089.582560][ T26] audit: type=1804 audit(1567690580.199:2141): pid=14433 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2997/memory.events" dev="sda1" ino=17060 res=1 13:36:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xec000000, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:20 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c001200) 13:36:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x0, 0x8}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x700000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x1a0ffffffff, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:20 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400020000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70082ba3bb9000000000000fb9500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad418841f0bf5e7346b82363e1c49cca26d0a45c67e1aeae385e0bf42459575d12651529953d9fec3b46bdce61063945398161fe8c6d86a704e312580d1d64904804d5ddfed5f24aa7c4e54c8df57f8388c6d93d4b48a02795b3d6148e1c333f39abd067470"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100}, 0x28) 13:36:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x1a03000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x0, 0xa}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000a0ffffffff, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x800000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:20 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000005800)={&(0x7f0000005180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005200)=""/59, 0x3b}, {&(0x7f0000005240)=""/152, 0x98}, {&(0x7f0000005300)=""/117, 0x75}, {&(0x7f0000005380)=""/24, 0x18}, {&(0x7f00000053c0)=""/172, 0xac}, {&(0x7f0000005480)=""/145, 0x91}, {&(0x7f0000005540)=""/72, 0x48}, {&(0x7f00000055c0)=""/164, 0xa4}], 0x8, &(0x7f0000005700)=""/229, 0xe5}, 0x40) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000100)='syz0\x00', 0x1ff) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r4, &(0x7f0000000100)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x41, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3f, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100}, 0x28) 13:36:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x0, 0x10}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x1c00000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2090.351096][ T26] audit: type=1804 audit(1567690580.959:2142): pid=14475 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2998/memory.events" dev="sda1" ino=17104 res=1 13:36:21 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c001300) 13:36:21 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x100000000000000, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0xa00000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x0, 0x13}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:21 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1c, 0x3d, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff256405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e9d022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4ca08d316d252b2a7de037a15c273b900000000000000000000000047127aed836d5e661be6929640cf862e356675a3b38500f4c2d06f4c3108d746e9fc13323767231846796c815d155587159d7b41d161f24b15d17ef82dfdcc798ea6e29ff431de59031743bbb7ee53798ac0896b623873b2c124de9948c39736527b4b7adee8e8e5856662dc9ccc529f08b52f175e684a36d3e407a8c3b5d896dc658e4b3bc444908ccab9189d5e073457cb903a323f5c72c566c9d0f9"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100}, 0x28) 13:36:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x2a00000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2090.861159][ T26] audit: type=1804 audit(1567690581.469:2143): pid=14475 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2998/memory.events" dev="sda1" ino=17104 res=1 13:36:21 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1e, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0xa}], &(0x7f0000000140)='syzkaller\x00', 0x79, 0x56, &(0x7f0000000180)=""/86, 0x1376709609eeeae9, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x3}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000700)={r1, 0x0, 0x64, 0x17, &(0x7f0000000680)="54feb398e0bf26da38f3d816eb002ef057b07fc7160d14a3f341adc0c1c0c9d610774b799a21ff3ab8e8103a958f6c8686c8498d1e19799e7ca51ca5863bbd4c140f9ecd3775d308269b88c83cb33c97449ac28b3fef01d8ddc064962ad29f6e28b3dcc1", &(0x7f0000000300)=""/23, 0x100000000}, 0x28) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r2, &(0x7f0000000100)='syz0\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000100)='syz0\x00', 0x1ff) r4 = openat$cgroup(r3, &(0x7f0000000400)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x4c, &(0x7f0000000b00)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703001d00feffff7a0af0fff8ffffff79a4f0ff00000000b701000100000000006405000000000065040400010040000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee4625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd95103b92104780624b6329a3a24e77e91adf5a8524603478b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d56134fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9eebc1ae7d62f80d3cd04d8591c72b3aa746a954a978c0473577d13dd701eae76902fd22978c6c69617bf8dbe19ce3d6eb6d2384ebf574ad0273e257af8693c18234c1e9ff68866c1e359281e2943f9fc036764670b8ca3916b868a356a0d9d7714b0526daf881d5593624ffdda59e06bab2fd52da48626801c51b5f3be79fbc9c50070921da8723d8adfc8bd0554a98c9a1309c51a3ef88fdfde3c7e9dfa3bc1cc0705a12a1971c2db153ea5b5d8d27276260d1946ec77c992630101634a4394f0a87a961670d06bfb446244fb94975d59398000de0a9deb7676185355015eb61fde4a4a1a93fee702c419d05b02a763e540e3a72fb782b214cc4dfe1847e4eed6781671ffd46c16d344590f116b655c258dc67e948fcc86302940c109e4e8090b5d5bf91e18c1f56dd14dd49e81a6694ebd49b7f92d0f7e59000000000000000000000000000000bd316e70c0047ab6504e267d37d87f24412d8a6e4c56d941c14970be0621f01a599a5ccb545e162ff976589ca7fc214883dc518182fdd51be7ac3cb9343e16c74abaaab68f48d5dade51c12379927e34d2bf6ce43c043c0ce3126f683d02c3f8ff2d1e1b24bd5e65f7e0814aaa6493617b500678a457dc5a46de83600247c72a9bbe4cdf7b8135f78ad2d3362e0625bcfb33844613fb933c7f7170a8433b5b07fbae653102cd7830442c1b8ed516bff415e5e7e1057fd3aa74e1ee82edc554c280535190d702221f8dc42d6f360a0ac4ad40bf1003cca5b48ba6f3fcae9c518c011e39665274c70c12950d384b00e48cd8d3e47ae0729f2c108648a4536b07e53b50ffa758a847a60c7439a6f448ea86765a87e1e388da"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100}, 0x28) 13:36:21 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x200000000000000, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x1000000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x0, 0x48}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x2c03000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) [ 2091.114311][ T26] audit: type=1804 audit(1567690581.729:2144): pid=14517 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/2999/memory.events" dev="sda1" ino=17125 res=1 13:36:21 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x1}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x18}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x11036, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x7f00, 0x0, 0x0, 0x2000]}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100}, 0x28) 13:36:22 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c001400) 13:36:22 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x1300000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:22 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x300000000000000, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x0, 0x4c}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3003000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:22 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x202000, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000005080)={0x10, 0x3, &(0x7f00000009c0)=ANY=[@ANYBLOB="0303fcff0500b2fb96a1f00c97e7548e7e0052a83360e7cb86be8832b942"], 0x0, 0x2, 0xf3, &(0x7f0000001340)=""/243, 0x410fe, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x11, 0xa, 0x300) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) sendmsg$sock(r4, &(0x7f0000000040)={&(0x7f00000012c0)=@generic={0xb, "ee51129278b7c7819b5596bde19ad470bf6c977a20466f0b592dd14754a8bdfb18f51267df07cd7b918a380a3b367f11c735e48cfa4475011c1b030fdc381228ff8cd9c6ba1197ede7a8f81683884afad503a8e5ca511bf6163e839b235e043a8df542ba25ed68875679afb5c78d2bd558e8d959d40d682808b45b47365c"}, 0x80, 0x0}, 0x83) recvmsg$kcm(r3, &(0x7f00000041c0)={&(0x7f0000003d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000040c0)=[{&(0x7f0000003d80)=""/160, 0xa0}, {&(0x7f0000003e40)=""/44, 0x2c}, {&(0x7f0000003e80)=""/217, 0xd9}, {&(0x7f0000004040)=""/57, 0x39}, {0x0}], 0x5, &(0x7f0000004140)=""/95, 0x5f}, 0x41) bpf$MAP_CREATE(0x0, &(0x7f0000004200)={0x7, 0x80, 0x80000001, 0x0, 0x18b, 0x1, 0x400, [], r6, r5, 0x5, 0x3}, 0x3c) recvmsg$kcm(r4, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x176}, 0x0) recvmsg$kcm(r5, &(0x7f000000d880)={&(0x7f000000d5c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f000000d800)=[{&(0x7f000000d640)=""/34, 0x22}, {&(0x7f000000d680)=""/170, 0xaa}, {0x0}], 0x3, &(0x7f000000d840)=""/21, 0x15}, 0x2000) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f000000d8c0)=r7) setsockopt$sock_attach_bpf(r4, 0x1, 0x1d, &(0x7f0000000100), 0x4) close(r4) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000940)={r4, r3}) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r8, &(0x7f0000000100)='syz0\x00', 0x1ff) ioctl$TUNSETSNDBUF(r8, 0x400454d4, &(0x7f0000000600)=0x9) ioctl$TUNSETIFINDEX(r2, 0x400454da, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000b40)={'irlan0\x00', 0x201}) recvmsg(r4, &(0x7f0000004b00)={&(0x7f00000045c0)=@hci={0x1f, 0x0}, 0x80, 0x0, 0x0, &(0x7f0000004a00)=""/242, 0xf2}, 0x100) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000980)=r9) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000140)=@hci={0x1f, r9, 0x2}, 0x80, &(0x7f00000028c0)=[{&(0x7f0000000280)="241ae1222fec749f9f07dda6bd5e452d1d25210e8b1a09e4c941cc579d8e695e5ed78394961e0a970ce0f60d06f6e5b435e271a1df67ef4d78fac7839b2557c49ddfe441dad987b18b0fd8d04bd5009b15387d2bd548f3924bc682359c016d1872d0e46dfab9bc20084e650d6b8629c84018fa0bfdde4c8d7ef7743b5dcffc5d42fbb1dd49aef1498cfdb19743da4ab73518cc4d92a508a772dd8257ef52d0971bdf0fc0ba5d349d9e3fbe16dcc2280b98bcb9714f624c01", 0xb8}, {&(0x7f0000000380)="f1a099f00c4bc64242f8d446b5bf885998b263e5f5f6d87fda60195be9c7971e35efb178b245d955b1593110117b31a732a52d8d086b59e0fdaba39d5ff44d76f8dbded0a027d352da0f02d3388e26390078950773f9d00d38ac62ff44230549886b6d1e409bf0e9ca7cc750d39e4f0f2207c90c906ac900f3b755dd37705c97d4f2c1e2e523a91785c0cb00f9c6c1cc2bfcbb6e40ceb4eb6a70", 0x9a}, {&(0x7f00000007c0)="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", 0x1000}, {&(0x7f0000000440)="2e9b24c598cc90606536f80780cc6c97077a50aaf42556703bdb28871449f489c31a3d5d00153da235d6fcc6f292b78a721a01afc4b881a6468611ed70f7e3879f61f1e5edce900979e89410cd868464d2559c5a898851581075eb7bcd9183ed2145b2aa2929adef1ec4f5ec13476ce5441355ffb94729d0eb0d01b17475cb2258ec459c616da908eca740765cddbd8a834227c18cd4016b47925643", 0x9c}, {&(0x7f0000000040)="385d23118897f7148beac976c4b5fcc5bb2b5138", 0x14}, {&(0x7f00000017c0)="adfdc2cd986677b80bab94d89a273d4a184a98843850030e389582a268b7f1a9c1499a05845003cca29495e4863593855baa40c62025f3fff30cb01ffbd2a321ea3e98e2ad33323b4b2f5b4aa8b54ec3b692f08152800a461fa08b67843f52584f715e370356c100504014f187e1efb3f1561162f4cc5973c8436ce90bd3db1ece91cc0fc4d980a9d5f923b72bf2e69455e30e4470b711a829c51fb6422e0142809db3c313c621edbcd50c69fb6bfd1b6fe08b88d62f67b18bd0f76da8c2d847c3376d2dd6b219c7e98f858239ef72062b27d2b5d92f62612a7388815c1b6b575013e144904ef75f5a94e8a3192b55c150608916456edc7e20b7d56c33e7f19244d00c4d207dc0e4afa1dd2e869679c64501febc4b67316a8799f69f7fd37996859ca6a584eb1be59215a9459aae23724ef708fc4bc8cb4a2731bf5ac8daf483a1f0ad4eeeb4ee9d5c004d9797b839572e3abb930bf2bf27bb07e7320e16c29a763e848f990ad398e66a441ca697456909d58562fcfeb1013e87f4b9e50f2d18d53fce229115165c84192f697ea08fc10e751ea8139448849d033dccf4bf8ee737541ca26289ce65445760437cdbfb92a3e6d3abcb94928d84c3505c14ef90548cabbcb310ea795b3a4eeb34caa8d716e9f80d6af4c945d1525caa8732fda8f3ad71aee4a2492746e8cad57a6749e9fb61c9fb76545ed47bc42dea84fda3b4a71961d6749212005f6b42fc87175c119e826295013934c42cc9f4b4322d3fdea396300e006dbfddfd8de0863b3be141239f7243e61be1c8d86f1557d107278225de96895e3f08dcdf828454d1e35fd1090f8bba2412a3b1b458875186f4a477e655f10854f983abcbd34fdf82594b61dbe50ec3bcdf9d180b2e680dacd3974106b3a3db0ab2ffcb5396d46c7bee799588c21506ee488414096835392a3c22c279ffa758ccdc45d094b4f94ee6824283457928d56e236dcfed05d0bfe582cf344a03011dd6018d94e2cd99b4d83e03a381aa9e0db07f6a5e419fa738f708a6c6a5a8b608d24375721aca7513d57a1992fdd7bbb61e9bb4f1510b088118a8688c6a99148c0f3c754c9051d096e5f0fbbf2487a4e9ada3fac38b3063b0a449efa4d4d5f0906cb453fbaebb4f76ed22a04609cb68e6e830d02008701661e257a739913781b6d4351340236d58b971fc5de8d38567adcfcd1c86fd9657f087b9d4f116da1bd9daa1d388605535b6d71d6d6abde853ad54bb2aed3364c9ee5f56d3e2e6778bb447a8fb83aa21d7aea85bf70990febb9f27d27e49f384552e3455e3fc36797063f4a336227009b6cdd0e37579f0b4bb3a64be9c6d8b9b9c2c5cfc45ddf984feb86f78f605b5584aec657dc8393d1f896419d5b28ed369c2529ae76b1b78c178c09ec595c7e35bce10b6979767d51bc65f1b678cfa101d084207950900c951f35e18a7691936a96c4cfdf3a4fb2f506cc058a3cf03d154a22daad5804f4bcf4357fa971d56fdda1b977a4c20068ecde35a8535fa244e0a66d6a9ebca93f37b794d8931581609d24690c92c41a39b5a33f70b330a8f055057dcb714b10401355cdb3fe1cd7cf23f92df07e4ca7274796f1d130f66ff51540a68e417fb1101eef7541b1399287a13eb042a4097f78158bb71cf2970d4f2c079a8b6cfde1ce7268719df2faf5ecc77d927119327ed0bc23394769755eb7af85b3cc1755a5ccee2bc0f34e76a6741db7a1e86a85d20c20847ba970c9102341e66f7c0fcbeceece1fb931618a10625a7d63d41137cf4dd8ec7670823d99f2f1894f84cd85911667c73923b613720ae0a6ceec54a184e7af22761818576571f066852cfcc27eeff316d43c1e538b1d06a087a6bad7901fae9dcf4d765f65ef5a41213a02112c6ae44d5b69efaa714efc41d3b51c27ec86aaf3198e93d23a92211535e3932b9ab3cafe74334817f9ae1d5e73dcdb2d4d58ca51f097f3aa559ad55ef3728f7889f486409dcd2660b14bba0cbf88a845e04dc69d4df85ec34a1989075cd5cd17a282f020e90a7e36a94414a79eaa513b7b2a24ed356e7fcb6acf4236760e0e6853dc7279b0e36491fb641b0af33592fe01844229010cb5fd49dcb0acad9745a8a44984dbc8f62938f3c240bcd0e52b8064fcda78022669562948b7ad60a922410b36d4df1bb0b3f454aa9e6e665dbc2524ac521b7d751d7cfc3bb4a36c8ea0a2711d378aa96da788b2cb069f3cecf9705650e8895861874740c1b93bda262d7c9f2c372a97ab96d2cd9bac3b5c8aa3788e8e274a4f11d2af5b732f70625d05bc3481a5e0d4a4052565a528f5e5151dd2de8fca97040e7038450ef840391134d021fa4d0fd19a19c90a233c9ed6a8349fd166c2bbf8e11cc8b591e217775e35518528056b65e11dd023e73de213efa9d75158362fa19c3b1726fe4992731ff5718b9e7ff2a1338b479a8ec87036f45ab58fab63745ae1e9c48710b4b18934b5540e1063b77ab2464874fb0b70ff51a0c510c9c53bf8cb8d36782fd9db483de31d5ed7554c1605116f32e0b64a2e89eba111b75a1e26753602abf430523a7da361e212c8231ebbfbc3e109f3669bc70482ae9191a3342a36b7abf4a1761b3cb8e66f246091cac9fb97b99b4f1d0feb6dfcca6808adab29e930c5bf14fbc01a10449ee645607df52554ba3c29ee5cc6fe8aa3d3a41c08fcfb6aa7561bbe12d1e79cb2c1a69ec31251fb555bbf8fe6e3f8c4ffd0980c4d57e97fb854746dc8d8b9610ab5b42e15d89b9e17b1d3c5dc938621e8301b1ef9f9b34862550c73d5a70b348b1c56ba52e9a434c5345ccd7f5e3d32ca55f0608aa4ddd0e26fedbbe2b67cd4aa15ec013171429b00412d643a318a95a1d4adb1bfd97590520e025856bc79535800fabe3666f2368a9cd77875a9796e3773c49aba85d07c2e85273c582ce24f8d94310b018b073166b70f2387dd6ba4e6244bc93fc4b94590a1b6a10de17fb8cc336d6aa96d533a89fcb1725b36cd1dd3399c72c8341014e07148afc6323c6923af47146e5f1e3deb642d7b497c3f34e0f101c2e59b7221807eef867d0d696fa7db6e4d89a075be35bdf548ab0c523ded9b4aff005a69a2cd0e8789a6146097e126fb2fb7e42aa70b549fc0f87c5137ef220ff33fe887e71137224612e24fbaa38e10ffc2ff2f28fd9b5ae198f379d9c445b35ab8c321f943bd8485eea42e6f3d0755d20aa47dd8042efeb46427565e4b7cc1e4f24e4a082cf26894c27f830fbda7401392cda9a9779fe01647f083caab9e309c4a717e1924d42f5a886b1b04fcb76675ce45dd6b0ae7055e30a2d271fae1088beceb5f9e521b6888683d2179b559ebb68b761d2e30ac12a5f2bea68072916f562636a3cb5a53c809b03e541bf52885b277e993530596cb6739b1d35e207dbd7d99a461ca321bb657f8fcee2147b914108ed15f633b83d58b5d819017f1497e9267b06821b2e724008553e2c1525e3d15c8fbf2234e0c2b877514112b0fe9d4a6599114e06620506feb08b0e02e34828df8653d32233b258f0d117ce39e479a19ecce69d67f09496dc370802c9b6ae4767d1ace7744f33d6b79e7692e3fc5139329e414363c888cc78d1d8851140f9ae7bd8dec61b9f0c8353848916b3fd8c63a1d46061c0e7413c5cd43351ed702489385feb6335d81919ea8c5ade55afd17f12a9c26cfdae8a2f814ad878c87e6f24a0d3f766fdf7f8fa2b9e2d2c35e630b9b8001166f2c430479626c020e917d4fa5cd186d2e5831cc4db3399c9b8fc9c340485855b1e82cd313941c0150e25188cf08a0e5c871314f4e2564a1c445938243e53816f004e224e36ccd3a6c4b6ea427ffcaeae21e64698f474271c5fafec0f549d910d29486bbf1c9a17d44ca470e42f567def05493ab99ec2a4da1d12ff768197a86cda112b1929c667124befc9513ca527c9f947441e47a15be7dc7e669e4d0e6cd8b85cc8ce38fda7f4a553ae4db77449b2f9adc597533ee5577731402dad03574fda8ec46eb27780334f950c889294c6f03a75965acb9371cf9649a5d0156a7f7f9e0d2077032d724dafca0cf129598742aeec99d171f6b0bd2f959cbe4985737a352481452124ce2806a9e86ae5939aa9e0f1c694c69f636ad9cd2099a273b3191f2879c44b8ce3e9942f63f819625c360a8ed8b03c6669e0c41faed65ba583f37e3e9b9a78b46ee572e314a0dc9f256579c27982792135dbcfdbac4da5ea3864545d67e19cd9b5e76fe80b148dedd3c26795ffde5b39cff9dc287c4a7f75722011c0aeba486ca4b956af540763978ddb241869e1f243c8e726e3d9efcd432742f76b874d7486ce710cc04fc22e0d30a0b97b153f1f7a1057f3439d13e6c9c35014feb3c348df4ce73abf5a1fb400d77a828ce6b43fc945b917c937ab5479312ee0ce0b7292d4963b8644900da1c252f3cfd2e4d7157ac0564900043e906a9ceb0a36b912a24a7bc1fd29431797274b8e1a42a7d4c9aa3a8225930d893f46f45a91212d2268faf050dafd5658f98dd7e9f138426450a56b399866af75a2dbce59e495bd59fb15de315e33434ea9520b81eb7739c739a5e1a3cca29ccda0ed061729aa090fa839411ff2a4d5081e2bbc1ee77021421535a36ee30b1d10991349f14434c739201c4edd1ff4b56dd48dd2fa3325b491109289e9128ed4925ae4078e2a4767a0aec5e98c9e112558eb7bf248293d047bc19ca22e21f8cfa460c01a59e9253a31da364e5dfc6327cd6a64b8c8994fb75186edba6afa3935dcb75c6db28caea6107ba7db91a9e01b73517c422b7625ed5314edbb72baece3de1b0d9b0a5097a01dd5bc6e65aaf84ebcb3d91d9598d0ce0c5088a1f2f33d57f01bef76251cdeb05a4b4ade8917321ba01d06362fd0277cf8b5dac9879a80ce6cc3780d76f611b04692c3f21a04a557d9cf2a1d7c467e662f4fabd20ec6faf28cd41dcc41a56cbc5aeb07cee84db40d82613b96e608f03fd0af0ba41aec133d787cd244dc4761356ccff91f379e47043673f54a54801ce5049f8afc13fccdca101258815139cfc02d457f78fbcc272fb032804a8151a3c9e0c1e3a1b9674a5ecb4224df46a6901fa055778311162c0c5d92338282efe904966ba9302a8678ada743dd84ca89470900bd2aa610194e419973443892cbf58f9853438e027582d0e8b779be3a97fd7261d9e25ec8330aae12eb4bae558666d7c097e61362a8480c3585772a31944b9417eb9d70dbb24e5d0bf1f36af9b20392ef239103f6524edd6f194f3517fddc9a0fcc4c1650cc2a8d6f2e166cdc48dbe9c5c052193c1b08e4e8446c1528b3ff910979ca6dd0370a1289b41fabe6844d4086052689f37b5b3d4cc9569627083612a7ca9f5c7f18436c360653bb351589c685113a32b79d4ebda711414e2eea3e76e0197ebb5a46401c74631ed96cc87297f9d22722449e69f5d09e3897732b5ab3721a0303945d3d537df6ff43c7b7c7d234d6f8e6671d343da671db25c7b7b62224b2ba874f1e3be5823416d8b8ef3ed819934714b99feee19c7e7bd263d932953d5e3dd02d139adbbc63a9c2e7789b7934fd7b1080c102ae0ed306a5977ac198b1f6e5440fc5d01577993e40c3804b9d1a04a5076b15e82a14685ea5f6a758140e97ff23acd76dc22feb5c7aab3cea2faffc88bfd03caf09a87dca21bc74e9f9bf822fb8c43469c597c26102aef8820be2921abd610e8efa2e792a45c8c534a78cd0e3afa12696fb5b52ff85664f852ec8829427f6ffe6af30af13c9b247c5cf58490454375cf527", 0x1000}, {&(0x7f00000001c0)="be94ad506dc58cec8d825539ccf09130607fd984cd8201a10f70f9abeb560c351fa0646a2b627dbe1ef0a79bb6cf50", 0x2f}, {&(0x7f0000000500)="29ec34a12ef53085ae216ab09bbb30a6e49cbac1afafcd841de94cf8dab6671188b06b1e980c42e0e1cf9e131cc8fc2306a213572100f7377772651ee143f06878973bcfab818d27acce604042568894807e57035b270fca88737759541d08c90b8a4c5b45abb621b956819e59a0f171eb36f167512501982fa75679a8aa9711a8ae4c08925b50f2daeb", 0x8a}, {&(0x7f00000027c0)="2b1fa7234ba990a69691600c419e4a0fec9296fa8c99f77f02f670af6c9aec21e323f7cb5824cb1ed3d902f0040615aa87168242ea94fb1498e4f3218d56de461bf0118e318b90aa63416f4040dd6bf8e75772943f5ae690fabdc48d67c281103d17e5cd190bd2a98b958acc37f8b4aca25d28d77612f602da3d363314d2bc220b71f014ef7246db60adcdd36bc87cf2eaea1ae45a7dd4406a0914c43a5daf17b42230841faa3e45bb51e04ad69f3d4cb43c277eba152d5a25945575caf05c1d240ba7304bcc12c792e9aa5bea74d11c681d404aa2a30abde2772e066ef6ac6f2cd6f808e4a4e0a25964550f9bf300192c04caa3", 0xf4}], 0x9}, 0x4000934) 13:36:22 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x400000000000000, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:22 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x4000000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x0, 0x68}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2091.851578][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2091.857448][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:36:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x3f00000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x0, 0x6c}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:22 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x500000000000000, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2092.030708][ T26] audit: type=1804 audit(1567690582.639:2145): pid=14570 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/3000/memory.events" dev="sda1" ino=17025 res=1 13:36:23 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x3c001500) 13:36:23 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x4800000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:23 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x0, 0x74}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:23 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x600000000000000, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x4000000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:23 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630477fbac141414e9", 0x0, 0x100}, 0x28) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r3, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r4}, 0xc) close(r5) r6 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r6, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r6, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r6, &(0x7f0000001100)={&(0x7f0000000a80)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000b00)=""/225, 0xe1}, {&(0x7f0000000c00)=""/190, 0xbe}, {&(0x7f0000000cc0)=""/159, 0x9f}, {&(0x7f0000000d80)=""/116, 0x74}, {&(0x7f0000000e00)=""/54, 0x36}, {&(0x7f0000000e40)=""/159, 0x9f}, {&(0x7f0000000f00)=""/68, 0x44}], 0x7, &(0x7f0000001000)=""/220, 0xdc}, 0x40012023) bpf$PROG_LOAD(0x5, &(0x7f00000011c0)={0x18, 0x9, &(0x7f0000000500)=@raw=[@generic={0x1000, 0x200, 0xffffffffffffff81, 0x2, 0xc45e}, @generic={0x3f, 0x1, 0xbe9, 0x0, 0x915}, @jmp={0x5, 0x20, 0x6, 0xb, 0x4, 0xb0, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x5}, @map={0x18, 0x212b03b1cbdfcc54, 0x1, 0x0, r5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3}], &(0x7f0000000580)='syzkaller\x00', 0x1, 0x0, 0x0, 0x20780, 0x1, [], r7, 0x12, r1, 0x8, &(0x7f0000001140)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000001180)={0x3, 0xd, 0x3, 0x800}, 0x10}, 0x70) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000005080)={0x10, 0x3, &(0x7f00000009c0)=ANY=[@ANYBLOB="0303fcff0500b2fb96a1f00c97e7548e7e0052a83360e7cb86be8832b942"], 0x0, 0x2, 0xf3, &(0x7f0000001340)=""/243, 0x410fe, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r9 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) recvmsg$kcm(r8, &(0x7f00000041c0)={&(0x7f0000003d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000040c0)=[{&(0x7f0000003d80)=""/160, 0xa0}, {&(0x7f0000003e40)=""/44, 0x2c}, {&(0x7f0000003e80)=""/217, 0xd9}, {&(0x7f00000004c0)=""/57, 0x39}, {0x0}], 0x5, &(0x7f0000004140)=""/95, 0x5f}, 0x41) bpf$MAP_CREATE(0x0, &(0x7f0000004200)={0x7, 0x80, 0x80000001, 0x0, 0x18b, 0x1, 0x400, [], r10, r9, 0x5, 0x3}, 0x3c) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@restrict={0xf, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x30, 0x0, 0x2e, 0x0, 0x2e, 0x61]}}, &(0x7f00000001c0)=""/22, 0x2c, 0x16}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x7, &(0x7f0000000040)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x80000000}, @generic={0x0, 0x9f0, 0x3f, 0x4, 0x7}, @generic={0x5, 0x1000, 0x9, 0x7, 0x1f}, @call={0x85, 0x0, 0x0, 0x54}, @ldst={0x1, 0x3, 0x2, 0xb, 0x403591b23fb1b41d, 0x40, 0xfffffffffffffff0}, @alu={0x0, 0x9, 0xf, 0x2, 0x0, 0xfffffffffffffffc}], &(0x7f0000000140)='GPL\x00', 0x401, 0xa4, &(0x7f0000000280)=""/164, 0xc7c8ea8977544396, 0x1, [], r10, 0x4, r11, 0x8, &(0x7f00000003c0)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x4, 0xa, 0x7, 0x3b}, 0x10}, 0x70) 13:36:23 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x0, 0x7a}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:23 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x4c00000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:23 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x700000000000000, 0x12, 0x10, 0x3, [@var]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) 13:36:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x200, 0x97, 0x80, 0x1, 0x7, [0x0, 0x4001000000000000], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r2, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r2, &(0x7f000000b000)={&(0x7f000000aac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000af40)=[{&(0x7f000000ab40)=""/96, 0x60}, {&(0x7f000000abc0)=""/40, 0x28}, {&(0x7f000000ac00)=""/209, 0xd1}, {&(0x7f000000ad00)=""/34, 0x22}, {&(0x7f000000ad40)=""/162, 0xa2}, {&(0x7f000000ae00)=""/1, 0x1}, {&(0x7f000000ae40)=""/207, 0xcf}], 0x7, &(0x7f000000afc0)=""/32, 0x20}, 0x40000140) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000b140)={&(0x7f000000b040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0xb, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xfa579ea36fab9925, 0xe, 0x5f, 0x61, 0x2e]}}, &(0x7f000000b080)=""/141, 0x2f, 0x8d}, 0x20) 13:36:23 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x0, 0xec}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2092.721401][ T26] audit: type=1804 audit(1567690583.329:2146): pid=14603 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir327519655/syzkaller.6dBuGe/3001/memory.events" dev="sda1" ino=17120 res=1 13:36:23 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x6800000000000000}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x1}, 0x20) [ 2093.002156][ T5895] WARNING: CPU: 1 PID: 5895 at kernel/bpf/core.c:851 bpf_jit_free+0x157/0x1b0 [ 2093.011334][ T5895] Kernel panic - not syncing: panic_on_warn set ... [ 2093.018016][ T5895] CPU: 1 PID: 5895 Comm: kworker/1:8 Not tainted 5.3.0-rc3+ #0 [ 2093.025557][ T5895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2093.035660][ T5895] Workqueue: events bpf_prog_free_deferred [ 2093.041559][ T5895] Call Trace: [ 2093.044867][ T5895] dump_stack+0x172/0x1f0 [ 2093.049307][ T5895] ? bpf_jit_free+0x140/0x1b0 [ 2093.053994][ T5895] panic+0x2dc/0x755 [ 2093.057894][ T5895] ? add_taint.cold+0x16/0x16 [ 2093.058812][ T3907] kobject: 'loop4' (0000000063141756): kobject_uevent_env [ 2093.062580][ T5895] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2093.062587][ T5895] #PF: supervisor read access in kernel mode [ 2093.062593][ T5895] #PF: error_code(0x0000) - not-present page [ 2093.062606][ T5895] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8fc9a067 PTE 0 [ 2093.072693][ T3907] kobject: 'loop4' (0000000063141756): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2093.077391][ T5895] Oops: 0000 [#1] PREEMPT SMP KASAN [ 2093.077405][ T5895] CPU: 1 PID: 5895 Comm: kworker/1:8 Not tainted 5.3.0-rc3+ #0 [ 2093.077421][ T5895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2093.093424][ T3907] kobject: 'loop2' (0000000072de8627): kobject_uevent_env [ 2093.096879][ T5895] Workqueue: events bpf_prog_free_deferred [ 2093.121317][ T3907] kobject: 'loop2' (0000000072de8627): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2093.129788][ T5895] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 2093.129799][ T5895] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 2093.129805][ T5895] RSP: 0018:ffff88808adbf850 EFLAGS: 00010806 [ 2093.129814][ T5895] RAX: 1ffffffff4006000 RBX: ffffffffa0030000 RCX: ffffffff817dc69f [ 2093.129821][ T5895] RDX: 0000000000000000 RSI: ffffffff817dc6a9 RDI: 0000000000000006 [ 2093.129829][ T5895] RBP: ffff88808adbf890 R08: ffff88808be14640 R09: ffffed1015d26cb4 [ 2093.129835][ T5895] R10: ffffed1015d26cb3 R11: ffff8880ae93659b R12: ffff888098d06cb8 [ 2093.129842][ T5895] R13: dffffc0000000000 R14: ffffffffffffffff R15: ffff888098d06cb8 [ 2093.129856][ T5895] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2093.169399][ T3907] kobject: 'loop3' (000000007a9f71b9): kobject_uevent_env [ 2093.178722][ T5895] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2093.178729][ T5895] CR2: fffffbfff4006000 CR3: 000000008cb0b000 CR4: 00000000001406e0 [ 2093.178738][ T5895] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2093.178744][ T5895] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2093.178748][ T5895] Call Trace: [ 2093.178768][ T5895] ? rcu_rnp_online_cpus+0x1/0x40 [ 2093.178793][ T5895] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2093.186877][ T3907] kobject: 'loop3' (000000007a9f71b9): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2093.192814][ T5895] #PF: supervisor read access in kernel mode [ 2093.192821][ T5895] #PF: error_code(0x0000) - not-present page [ 2093.192826][ T5895] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8fc9a067 PTE 0 [ 2093.192849][ T5895] Oops: 0000 [#2] PREEMPT SMP KASAN [ 2093.192861][ T5895] CPU: 1 PID: 5895 Comm: kworker/1:8 Not tainted 5.3.0-rc3+ #0 [ 2093.192867][ T5895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2093.192883][ T5895] Workqueue: events bpf_prog_free_deferred [ 2093.345761][ T5895] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 2093.352028][ T5895] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 2093.371701][ T5895] RSP: 0018:ffff88808adbf378 EFLAGS: 00010806 [ 2093.378037][ T5895] RAX: 1ffffffff4006000 RBX: ffffffffa0030000 RCX: ffffffff817dc69f [ 2093.385995][ T5895] RDX: 0000000000000000 RSI: ffffffff817dc6a9 RDI: 0000000000000006 [ 2093.393946][ T5895] RBP: ffff88808adbf3b8 R08: ffff88808be14640 R09: 0000000000000000 [ 2093.401902][ T5895] R10: fffffbfff134b11f R11: ffff88808be14640 R12: ffff888098d06cb8 [ 2093.409861][ T5895] R13: dffffc0000000000 R14: ffffffffffffffff R15: ffff888098d06cb8 [ 2093.417913][ T5895] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2093.426819][ T5895] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2093.433392][ T5895] CR2: fffffbfff4006000 CR3: 000000008cb0b000 CR4: 00000000001406e0 [ 2093.441346][ T5895] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2093.449305][ T5895] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2093.457262][ T5895] Call Trace: [ 2093.460551][ T5895] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2093.468255][ T5895] #PF: supervisor read access in kernel mode [ 2093.474219][ T5895] #PF: error_code(0x0000) - not-present page [ 2093.480279][ T5895] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8fc9a067 PTE 0 [ 2093.487814][ T5895] Oops: 0000 [#3] PREEMPT SMP KASAN [ 2093.493013][ T5895] CPU: 1 PID: 5895 Comm: kworker/1:8 Not tainted 5.3.0-rc3+ #0 [ 2093.500538][ T5895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2093.510744][ T5895] Workqueue: events bpf_prog_free_deferred [ 2093.516540][ T5895] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 2093.522670][ T5895] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 2093.542272][ T5895] RSP: 0018:ffff88808adbee98 EFLAGS: 00010806 [ 2093.548331][ T5895] RAX: 1ffffffff4006000 RBX: ffffffffa0030000 RCX: ffffffff817dc69f [ 2093.556373][ T5895] RDX: 0000000000000000 RSI: ffffffff817dc6a9 RDI: 0000000000000006 [ 2093.564322][ T5895] RBP: ffff88808adbeed8 R08: ffff88808be14640 R09: 0000000000000000 [ 2093.572275][ T5895] R10: fffffbfff134b11f R11: ffff88808be14640 R12: ffff888098d06cb8 [ 2093.580663][ T5895] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888098d06cb8 [ 2093.588629][ T5895] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2093.597536][ T5895] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2093.604111][ T5895] CR2: fffffbfff4006000 CR3: 000000008cb0b000 CR4: 00000000001406e0 [ 2093.612065][ T5895] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2093.620017][ T5895] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2093.627977][ T5895] Call Trace: [ 2093.631266][ T5895] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2093.638955][ T5895] #PF: supervisor read access in kernel mode [ 2093.644909][ T5895] #PF: error_code(0x0000) - not-present page [ 2093.650861][ T5895] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8fc9a067 PTE 0 [ 2093.658389][ T5895] Oops: 0000 [#4] PREEMPT SMP KASAN [ 2093.663564][ T5895] CPU: 1 PID: 5895 Comm: kworker/1:8 Not tainted 5.3.0-rc3+ #0 [ 2093.671078][ T5895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2093.681122][ T5895] Workqueue: events bpf_prog_free_deferred [ 2093.686924][ T5895] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 2093.693067][ T5895] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 2093.712751][ T5895] RSP: 0018:ffff88808adbe9b8 EFLAGS: 00010806 [ 2093.718798][ T5895] RAX: 1ffffffff4006000 RBX: ffffffffa0030000 RCX: ffffffff817dc69f [ 2093.726871][ T5895] RDX: 0000000000000000 RSI: ffffffff817dc6a9 RDI: 0000000000000006 [ 2093.734841][ T5895] RBP: ffff88808adbe9f8 R08: ffff88808be14640 R09: 0000000000000000 [ 2093.742805][ T5895] R10: fffffbfff134b11f R11: ffff88808be14640 R12: ffff888098d06cb8 [ 2093.750758][ T5895] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888098d06cb8 [ 2093.758722][ T5895] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2093.767635][ T5895] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2093.774202][ T5895] CR2: fffffbfff4006000 CR3: 000000008cb0b000 CR4: 00000000001406e0 [ 2093.782167][ T5895] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2093.790241][ T5895] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2093.798198][ T5895] Call Trace: [ 2093.801688][ T5895] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2093.809390][ T5895] #PF: supervisor read access in kernel mode [ 2093.815353][ T5895] #PF: error_code(0x0000) - not-present page [ 2093.821308][ T5895] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8fc9a067 PTE 0 [ 2093.828859][ T5895] Oops: 0000 [#5] PREEMPT SMP KASAN [ 2093.834035][ T5895] CPU: 1 PID: 5895 Comm: kworker/1:8 Not tainted 5.3.0-rc3+ #0 [ 2093.841552][ T5895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2093.851638][ T5895] Workqueue: events bpf_prog_free_deferred [ 2093.857426][ T5895] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 2093.863557][ T5895] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 2093.883143][ T5895] RSP: 0018:ffff88808adbe4d8 EFLAGS: 00010806 [ 2093.889364][ T5895] RAX: 1ffffffff4006000 RBX: ffffffffa0030000 RCX: ffffffff817dc69f [ 2093.897330][ T5895] RDX: 0000000000000000 RSI: ffffffff817dc6a9 RDI: 0000000000000006 [ 2093.905288][ T5895] RBP: ffff88808adbe518 R08: ffff88808be14640 R09: 0000000000000000 [ 2093.913349][ T5895] R10: fffffbfff134b11f R11: ffff88808be14640 R12: ffff888098d06cb8 [ 2093.921397][ T5895] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888098d06cb8 [ 2093.929497][ T5895] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2093.938577][ T5895] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2093.945163][ T5895] CR2: fffffbfff4006000 CR3: 000000008cb0b000 CR4: 00000000001406e0 [ 2093.953131][ T5895] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2093.961083][ T5895] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2093.969043][ T5895] Call Trace: [ 2093.972350][ T5895] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2093.980043][ T5895] #PF: supervisor read access in kernel mode [ 2093.985997][ T5895] #PF: error_code(0x0000) - not-present page [ 2093.991947][ T5895] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8fc9a067 PTE 0 [ 2093.999483][ T5895] Oops: 0000 [#6] PREEMPT SMP KASAN [ 2094.004662][ T5895] CPU: 1 PID: 5895 Comm: kworker/1:8 Not tainted 5.3.0-rc3+ #0 [ 2094.012174][ T5895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2094.022220][ T5895] Workqueue: events bpf_prog_free_deferred [ 2094.028011][ T5895] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 2094.034143][ T5895] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 2094.053736][ T5895] RSP: 0018:ffff88808adbdff8 EFLAGS: 00010806 [ 2094.059801][ T5895] RAX: 1ffffffff4006000 RBX: ffffffffa0030000 RCX: ffffffff817dc69f [ 2094.067750][ T5895] RDX: 0000000000000000 RSI: ffffffff817dc6a9 RDI: 0000000000000006 [ 2094.075700][ T5895] RBP: ffff88808adbe038 R08: ffff88808be14640 R09: 0000000000000000 [ 2094.083827][ T5895] R10: fffffbfff134b11f R11: ffff88808be14640 R12: ffff888098d06cb8 [ 2094.091779][ T5895] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888098d06cb8 [ 2094.099732][ T5895] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2094.108810][ T5895] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2094.115387][ T5895] CR2: fffffbfff4006000 CR3: 000000008cb0b000 CR4: 00000000001406e0 [ 2094.123344][ T5895] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2094.131296][ T5895] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2094.139258][ T5895] Call Trace: [ 2094.142547][ T5895] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2094.150329][ T5895] #PF: supervisor read access in kernel mode [ 2094.156294][ T5895] #PF: error_code(0x0000) - not-present page [ 2094.162245][ T5895] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8fc9a067 PTE 0 [ 2094.169787][ T5895] Oops: 0000 [#7] PREEMPT SMP KASAN [ 2094.174964][ T5895] CPU: 1 PID: 5895 Comm: kworker/1:8 Not tainted 5.3.0-rc3+ #0 [ 2094.182567][ T5895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2094.192765][ T5895] Workqueue: events bpf_prog_free_deferred [ 2094.198573][ T5895] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 2094.205058][ T5895] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 2094.224657][ T5895] RSP: 0018:ffff88808adbdb18 EFLAGS: 00010806 [ 2094.230707][ T5895] RAX: 1ffffffff4006000 RBX: ffffffffa0030000 RCX: ffffffff817dc69f [ 2094.238655][ T5895] RDX: 0000000000000000 RSI: ffffffff817dc6a9 RDI: 0000000000000006 [ 2094.246618][ T5895] RBP: ffff88808adbdb58 R08: ffff88808be14640 R09: 0000000000000000 [ 2094.254599][ T5895] R10: fffffbfff134b11f R11: ffff88808be14640 R12: ffff888098d06cb8 [ 2094.262704][ T5895] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888098d06cb8 [ 2094.270666][ T5895] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2094.279574][ T5895] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2094.286138][ T5895] CR2: fffffbfff4006000 CR3: 000000008cb0b000 CR4: 00000000001406e0 [ 2094.294181][ T5895] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2094.302140][ T5895] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2094.310089][ T5895] Call Trace: [ 2094.313381][ T5895] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2094.321079][ T5895] #PF: supervisor read access in kernel mode [ 2094.327040][ T5895] #PF: error_code(0x0000) - not-present page [ 2094.332995][ T5895] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8fc9a067 PTE 0 [ 2094.340531][ T5895] Oops: 0000 [#8] PREEMPT SMP KASAN [ 2094.345716][ T5895] CPU: 1 PID: 5895 Comm: kworker/1:8 Not tainted 5.3.0-rc3+ #0 [ 2094.353242][ T5895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2094.363334][ T5895] Workqueue: events bpf_prog_free_deferred [ 2094.369257][ T5895] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 2094.375546][ T5895] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 2094.395396][ T5895] RSP: 0018:ffff88808adbd638 EFLAGS: 00010806 [ 2094.401464][ T5895] RAX: 1ffffffff4006000 RBX: ffffffffa0030000 RCX: ffffffff817dc69f [ 2094.409514][ T5895] RDX: 0000000000000000 RSI: ffffffff817dc6a9 RDI: 0000000000000006 [ 2094.417473][ T5895] RBP: ffff88808adbd678 R08: ffff88808be14640 R09: 0000000000000000 [ 2094.425430][ T5895] R10: fffffbfff134b11f R11: ffff88808be14640 R12: ffff888098d06cb8 [ 2094.433528][ T5895] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888098d06cb8 [ 2094.441499][ T5895] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2094.450446][ T5895] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2094.457022][ T5895] CR2: fffffbfff4006000 CR3: 000000008cb0b000 CR4: 00000000001406e0 [ 2094.464989][ T5895] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2094.472943][ T5895] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2094.480894][ T5895] Call Trace: [ 2094.484199][ T5895] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2094.491940][ T5895] #PF: supervisor read access in kernel mode [ 2094.497932][ T5895] #PF: error_code(0x0000) - not-present page [ 2094.503884][ T5895] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8fc9a067 PTE 0 [ 2094.511934][ T5895] Oops: 0000 [#9] PREEMPT SMP KASAN [ 2094.517111][ T5895] CPU: 1 PID: 5895 Comm: kworker/1:8 Not tainted 5.3.0-rc3+ #0 [ 2094.524627][ T5895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2094.534683][ T5895] Workqueue: events bpf_prog_free_deferred [ 2094.540487][ T5895] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 2094.546669][ T5895] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 2094.566254][ T5895] RSP: 0018:ffff88808adbd158 EFLAGS: 00010806 [ 2094.572301][ T5895] RAX: 1ffffffff4006000 RBX: ffffffffa0030000 RCX: ffffffff817dc69f [ 2094.580271][ T5895] RDX: 0000000000000000 RSI: ffffffff817dc6a9 RDI: 0000000000000006 [ 2094.588263][ T5895] RBP: ffff88808adbd198 R08: ffff88808be14640 R09: 0000000000000000 [ 2094.596221][ T5895] R10: fffffbfff134b11f R11: ffff88808be14640 R12: ffff888098d06cb8 [ 2094.604173][ T5895] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888098d06cb8 [ 2094.612128][ T5895] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2094.621212][ T5895] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2094.627828][ T5895] CR2: fffffbfff4006000 CR3: 000000008cb0b000 CR4: 00000000001406e0 [ 2094.635809][ T5895] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2094.643758][ T5895] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2094.652145][ T5895] Call Trace: [ 2094.655442][ T5895] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2094.663130][ T5895] #PF: supervisor read access in kernel mode [ 2094.669170][ T5895] #PF: error_code(0x0000) - not-present page [ 2094.675139][ T5895] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8fc9a067 PTE 0 [ 2094.682682][ T5895] Oops: 0000 [#10] PREEMPT SMP KASAN [ 2094.687951][ T5895] CPU: 1 PID: 5895 Comm: kworker/1:8 Not tainted 5.3.0-rc3+ #0 [ 2094.695469][ T5895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2094.705519][ T5895] Workqueue: events bpf_prog_free_deferred [ 2094.711411][ T5895] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 2094.717542][ T5895] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 2094.737141][ T5895] RSP: 0018:ffff88808adbcc78 EFLAGS: 00010806 [ 2094.743204][ T5895] RAX: 1ffffffff4006000 RBX: ffffffffa0030000 RCX: ffffffff817dc69f [ 2094.751170][ T5895] RDX: 0000000000000000 RSI: ffffffff817dc6a9 RDI: 0000000000000006 [ 2094.759141][ T5895] RBP: ffff88808adbccb8 R08: ffff88808be14640 R09: 0000000000000000 [ 2094.767098][ T5895] R10: fffffbfff134b11f R11: ffff88808be14640 R12: ffff888098d06cb8 [ 2094.775052][ T5895] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888098d06cb8 [ 2094.783281][ T5895] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2094.792207][ T5895] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2094.798768][ T5895] CR2: fffffbfff4006000 CR3: 000000008cb0b000 CR4: 00000000001406e0 [ 2094.806717][ T5895] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2094.815015][ T5895] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2094.822965][ T5895] Call Trace: [ 2094.826276][ T5895] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2094.834054][ T5895] #PF: supervisor read access in kernel mode [ 2094.840005][ T5895] #PF: error_code(0x0000) - not-present page [ 2094.845958][ T5895] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8fc9a067 PTE 0 [ 2094.853578][ T5895] Oops: 0000 [#11] PREEMPT SMP KASAN [ 2094.858860][ T5895] CPU: 1 PID: 5895 Comm: kworker/1:8 Not tainted 5.3.0-rc3+ #0 [ 2094.866469][ T5895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2094.876521][ T5895] Workqueue: events bpf_prog_free_deferred [ 2094.882325][ T5895] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 2094.888470][ T5895] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 2094.908521][ T5895] RSP: 0018:ffff88808adbc798 EFLAGS: 00010806 [ 2094.914573][ T5895] RAX: 1ffffffff4006000 RBX: ffffffffa0030000 RCX: ffffffff817dc69f [ 2094.922523][ T5895] RDX: 0000000000000000 RSI: ffffffff817dc6a9 RDI: 0000000000000006 [ 2094.930771][ T5895] RBP: ffff88808adbc7d8 R08: ffff88808be14640 R09: 0000000000000000 [ 2094.938748][ T5895] R10: fffffbfff134b11f R11: ffff88808be14640 R12: ffff888098d06cb8 [ 2094.946713][ T5895] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888098d06cb8 [ 2094.954733][ T5895] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2094.963656][ T5895] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2094.970257][ T5895] CR2: fffffbfff4006000 CR3: 000000008cb0b000 CR4: 00000000001406e0 [ 2094.978216][ T5895] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2094.986192][ T5895] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2094.994140][ T5895] Call Trace: [ 2094.997452][ T5895] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2095.005248][ T5895] #PF: supervisor read access in kernel mode [ 2095.011211][ T5895] #PF: error_code(0x0000) - not-present page [ 2095.017174][ T5895] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8fc9a067 PTE 0 [ 2095.024711][ T5895] Oops: 0000 [#12] PREEMPT SMP KASAN [ 2095.029993][ T5895] CPU: 1 PID: 5895 Comm: kworker/1:8 Not tainted 5.3.0-rc3+ #0 [ 2095.037566][ T5895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2095.047642][ T5895] Workqueue: events bpf_prog_free_deferred [ 2095.053448][ T5895] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 2095.059640][ T5895] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 2095.079228][ T5895] RSP: 0018:ffff88808adbc2b8 EFLAGS: 00010806 [ 2095.085363][ T5895] RAX: 1ffffffff4006000 RBX: ffffffffa0030000 RCX: ffffffff817dc69f [ 2095.093333][ T5895] RDX: 0000000000000000 RSI: ffffffff817dc6a9 RDI: 0000000000000006 [ 2095.101284][ T5895] RBP: ffff88808adbc2f8 R08: ffff88808be14640 R09: 0000000000000000 [ 2095.109249][ T5895] R10: fffffbfff134b11f R11: ffff88808be14640 R12: ffff888098d06cb8 [ 2095.117199][ T5895] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888098d06cb8 [ 2095.125162][ T5895] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2095.134085][ T5895] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2095.140766][ T5895] CR2: fffffbfff4006000 CR3: 000000008cb0b000 CR4: 00000000001406e0 [ 2095.148720][ T5895] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2095.156758][ T5895] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2095.164796][ T5895] Call Trace: [ 2095.168084][ T5895] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2095.175778][ T5895] #PF: supervisor read access in kernel mode [ 2095.181736][ T5895] #PF: error_code(0x0000) - not-present page [ 2095.187708][ T5895] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8fc9a067 PTE 0 [ 2095.195254][ T5895] Oops: 0000 [#13] PREEMPT SMP KASAN [ 2095.200567][ T5895] CPU: 1 PID: 5895 Comm: kworker/1:8 Not tainted 5.3.0-rc3+ #0 [ 2095.208084][ T5895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2095.218317][ T5895] Workqueue: events bpf_prog_free_deferred [ 2095.224115][ T5895] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 2095.230266][ T5895] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 2095.249863][ T5895] RSP: 0018:ffff88808adbbdd8 EFLAGS: 00010806 [ 2095.255926][ T5895] RAX: 1ffffffff4006000 RBX: ffffffffa0030000 RCX: ffffffff817dc69f [ 2095.263890][ T5895] RDX: 0000000000000000 RSI: ffffffff817dc6a9 RDI: 0000000000000006 [ 2095.271964][ T5895] RBP: ffff88808adbbe18 R08: ffff88808be14640 R09: 0000000000000000 [ 2095.280063][ T5895] R10: fffffbfff134b11f R11: ffff88808be14640 R12: ffff888098d06cb8 [ 2095.288032][ T5895] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888098d06cb8 [ 2095.295992][ T5895] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2095.304902][ T5895] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2095.311496][ T5895] CR2: fffffbfff4006000 CR3: 000000008cb0b000 CR4: 00000000001406e0 [ 2095.319503][ T5895] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2095.327465][ T5895] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2095.335426][ T5895] Call Trace: [ 2095.338733][ T5895] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2095.346427][ T5895] #PF: supervisor read access in kernel mode [ 2095.352378][ T5895] #PF: error_code(0x0000) - not-present page [ 2095.358458][ T5895] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8fc9a067 PTE 0 [ 2095.365987][ T5895] Oops: 0000 [#14] PREEMPT SMP KASAN [ 2095.371246][ T5895] CPU: 1 PID: 5895 Comm: kworker/1:8 Not tainted 5.3.0-rc3+ #0 [ 2095.378775][ T5895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2095.388822][ T5895] Workqueue: events bpf_prog_free_deferred [ 2095.394623][ T5895] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 2095.400761][ T5895] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 2095.420429][ T5895] RSP: 0018:ffff88808adbb8f8 EFLAGS: 00010806 [ 2095.426482][ T5895] RAX: 1ffffffff4006000 RBX: ffffffffa0030000 RCX: ffffffff817dc69f [ 2095.434436][ T5895] RDX: 0000000000000000 RSI: ffffffff817dc6a9 RDI: 0000000000000006 [ 2095.442397][ T5895] RBP: ffff88808adbb938 R08: ffff88808be14640 R09: 0000000000000000 [ 2095.450354][ T5895] R10: fffffbfff134b11f R11: ffff88808be14640 R12: ffff888098d06cb8 [ 2095.458322][ T5895] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888098d06cb8 [ 2095.466280][ T5895] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2095.475194][ T5895] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2095.481756][ T5895] CR2: fffffbfff4006000 CR3: 000000008cb0b000 CR4: 00000000001406e0 [ 2095.489710][ T5895] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2095.497675][ T5895] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2095.505624][ T5895] Call Trace: [ 2095.508947][ T5895] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2095.516754][ T5895] #PF: supervisor read access in kernel mode [ 2095.522722][ T5895] #PF: error_code(0x0000) - not-present page [ 2095.528182][ T26] audit: type=1800 audit(1567690586.129:2147): pid=14603 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="memory.events" dev="sda1" ino=17120 res=0 [ 2095.528707][ T5895] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8fc9a067 PTE 0 [ 2095.556541][ T5895] Oops: 0000 [#15] PREEMPT SMP KASAN [ 2095.561844][ T5895] CPU: 1 PID: 5895 Comm: kworker/1:8 Not tainted 5.3.0-rc3+ #0 [ 2095.569372][ T5895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2095.579425][ T5895] Workqueue: events bpf_prog_free_deferred [ 2095.585217][ T5895] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 2095.591350][ T5895] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 2095.610931][ T5895] RSP: 0018:ffff88808adbb418 EFLAGS: 00010806 [ 2095.616983][ T5895] RAX: 1ffffffff4006000 RBX: ffffffffa0030000 RCX: ffffffff817dc69f [ 2095.626582][ T5895] RDX: 0000000000000000 RSI: ffffffff817dc6a9 RDI: 0000000000000006 [ 2095.634530][ T5895] RBP: ffff88808adbb458 R08: ffff88808be14640 R09: 0000000000000000 [ 2095.642482][ T5895] R10: fffffbfff134b11f R11: ffff88808be14640 R12: ffff888098d06cb8 [ 2095.650439][ T5895] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888098d06cb8 [ 2095.658396][ T5895] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2095.667320][ T5895] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2095.673880][ T5895] CR2: fffffbfff4006000 CR3: 000000008cb0b000 CR4: 00000000001406e0 [ 2095.681843][ T5895] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2095.689792][ T5895] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2095.697743][ T5895] Call Trace: [ 2095.701034][ T5895] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2095.708725][ T5895] #PF: supervisor read access in kernel mode [ 2095.714676][ T5895] #PF: error_code(0x0000) - not-present page [ 2095.720627][ T5895] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8fc9a067 PTE 0 [ 2095.728255][ T5895] Oops: 0000 [#16] PREEMPT SMP KASAN [ 2095.733524][ T5895] CPU: 1 PID: 5895 Comm: kworker/1:8 Not tainted 5.3.0-rc3+ #0 [ 2095.741039][ T5895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2095.751090][ T5895] Workqueue: events bpf_prog_free_deferred [ 2095.756973][ T5895] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 2095.763104][ T5895] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 2095.782688][ T5895] RSP: 0018:ffff88808adbaf38 EFLAGS: 00010806 [ 2095.788742][ T5895] RAX: 1ffffffff4006000 RBX: ffffffffa0030000 RCX: ffffffff817dc69f [ 2095.796691][ T5895] RDX: 0000000000000000 RSI: ffffffff817dc6a9 RDI: 0000000000000006 [ 2095.804675][ T5895] RBP: ffff88808adbaf78 R08: ffff88808be14640 R09: 0000000000000000 [ 2095.812713][ T5895] R10: fffffbfff134b11f R11: ffff88808be14640 R12: ffff888098d06cb8 [ 2095.820663][ T5895] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888098d06cb8 [ 2095.828627][ T5895] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2095.837638][ T5895] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2095.844200][ T5895] CR2: fffffbfff4006000 CR3: 000000008cb0b000 CR4: 00000000001406e0 [ 2095.852162][ T5895] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2095.861415][ T5895] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2095.869378][ T5895] Call Trace: [ 2095.872678][ T5895] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2095.880384][ T5895] #PF: supervisor read access in kernel mode [ 2095.886348][ T5895] #PF: error_code(0x0000) - not-present page [ 2095.892303][ T5895] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8fc9a067 PTE 0 [ 2095.899837][ T5895] Oops: 0000 [#17] PREEMPT SMP KASAN [ 2095.905104][ T5895] CPU: 1 PID: 5895 Comm: kworker/1:8 Not tainted 5.3.0-rc3+ #0 [ 2095.912707][ T5895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2095.922762][ T5895] Workqueue: events bpf_prog_free_deferred [ 2095.928550][ T5895] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 2095.934690][ T5895] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 2095.954272][ T5895] RSP: 0018:ffff88808adbaa58 EFLAGS: 00010806 [ 2095.960317][ T5895] RAX: 1ffffffff4006000 RBX: ffffffffa0030000 RCX: ffffffff817dc69f [ 2095.968267][ T5895] RDX: 0000000000000000 RSI: ffffffff817dc6a9 RDI: 0000000000000006 [ 2095.976220][ T5895] RBP: ffff88808adbaa98 R08: ffff88808be14640 R09: 0000000000000000 [ 2095.984170][ T5895] R10: fffffbfff134b11f R11: ffff88808be14640 R12: ffff888098d06cb8 [ 2095.992206][ T5895] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888098d06cb8 [ 2096.000163][ T5895] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2096.009071][ T5895] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2096.015633][ T5895] CR2: fffffbfff4006000 CR3: 000000008cb0b000 CR4: 00000000001406e0 [ 2096.023588][ T5895] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2096.031540][ T5895] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2096.039490][ T5895] Call Trace: [ 2096.042773][ T5895] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2096.050473][ T5895] #PF: supervisor read access in kernel mode [ 2096.056445][ T5895] #PF: error_code(0x0000) - not-present page [ 2096.062400][ T5895] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8fc9a067 PTE 0 [ 2096.069929][ T5895] Oops: 0000 [#18] PREEMPT SMP KASAN [ 2096.075192][ T5895] CPU: 1 PID: 5895 Comm: kworker/1:8 Not tainted 5.3.0-rc3+ #0 [ 2096.082711][ T5895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2096.092757][ T5895] Workqueue: events bpf_prog_free_deferred [ 2096.098556][ T5895] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 2096.104785][ T5895] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 2096.124545][ T5895] RSP: 0018:ffff88808adba578 EFLAGS: 00010806 [ 2096.130600][ T5895] RAX: 1ffffffff4006000 RBX: ffffffffa0030000 RCX: ffffffff817dc69f [ 2096.138553][ T5895] RDX: 0000000000000000 RSI: ffffffff817dc6a9 RDI: 0000000000000006 [ 2096.146545][ T5895] RBP: ffff88808adba5b8 R08: ffff88808be14640 R09: 0000000000000000 [ 2096.154501][ T5895] R10: fffffbfff134b11f R11: ffff88808be14640 R12: ffff888098d06cb8 [ 2096.162454][ T5895] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888098d06cb8 [ 2096.170405][ T5895] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2096.179329][ T5895] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2096.185900][ T5895] CR2: fffffbfff4006000 CR3: 000000008cb0b000 CR4: 00000000001406e0 [ 2096.193854][ T5895] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2096.201810][ T5895] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2096.209759][ T5895] Call Trace: [ 2096.213045][ T5895] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2096.220737][ T5895] #PF: supervisor read access in kernel mode [ 2096.226691][ T5895] #PF: error_code(0x0000) - not-present page [ 2096.232643][ T5895] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8fc9a067 PTE 0 [ 2096.240259][ T5895] Oops: 0000 [#19] PREEMPT SMP KASAN [ 2096.245532][ T5895] CPU: 1 PID: 5895 Comm: kworker/1:8 Not tainted 5.3.0-rc3+ #0 [ 2096.253066][ T5895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2096.263125][ T5895] Workqueue: events bpf_prog_free_deferred [ 2096.268920][ T5895] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 2096.275067][ T5895] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 2096.294666][ T5895] RSP: 0018:ffff88808adba098 EFLAGS: 00010806 [ 2096.300721][ T5895] RAX: 1ffffffff4006000 RBX: ffffffffa0030000 RCX: ffffffff817dc69f [ 2096.308671][ T5895] RDX: 0000000000000000 RSI: ffffffff817dc6a9 RDI: 0000000000000006 [ 2096.316621][ T5895] RBP: ffff88808adba0d8 R08: ffff88808be14640 R09: 0000000000000000 [ 2096.324571][ T5895] R10: fffffbfff134b11f R11: ffff88808be14640 R12: ffff888098d06cb8 [ 2096.332522][ T5895] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888098d06cb8 [ 2096.340559][ T5895] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2096.349473][ T5895] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2096.356039][ T5895] CR2: fffffbfff4006000 CR3: 000000008cb0b000 CR4: 00000000001406e0 [ 2096.363991][ T5895] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2096.371954][ T5895] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2096.379914][ T5895] Call Trace: [ 2096.383202][ T5895] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2096.391411][ T5895] #PF: supervisor read access in kernel mode [ 2096.397453][ T5895] #PF: error_code(0x0000) - not-present page [ 2096.403406][ T5895] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8fc9a067 PTE 0 [ 2096.410942][ T5895] Oops: 0000 [#20] PREEMPT SMP KASAN [ 2096.416217][ T5895] CPU: 1 PID: 5895 Comm: kworker/1:8 Not tainted 5.3.0-rc3+ #0 [ 2096.423731][ T5895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2096.433780][ T5895] Workqueue: events bpf_prog_free_deferred [ 2096.439661][ T5895] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 2096.445793][ T5895] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 2096.465415][ T5895] RSP: 0018:ffff88808adb9bb8 EFLAGS: 00010806 [ 2096.471460][ T5895] RAX: 1ffffffff4006000 RBX: ffffffffa0030000 RCX: ffffffff817dc69f [ 2096.479417][ T5895] RDX: 0000000000000000 RSI: ffffffff817dc6a9 RDI: 0000000000000006 [ 2096.487497][ T5895] RBP: ffff88808adb9bf8 R08: ffff88808be14640 R09: 0000000000000000 [ 2096.495468][ T5895] R10: fffffbfff134b11f R11: ffff88808be14640 R12: ffff888098d06cb8 [ 2096.503429][ T5895] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888098d06cb8 [ 2096.511480][ T5895] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2096.520389][ T5895] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2096.526950][ T5895] CR2: fffffbfff4006000 CR3: 000000008cb0b000 CR4: 00000000001406e0 [ 2096.534904][ T5895] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2096.542863][ T5895] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2096.550824][ T5895] Call Trace: [ 2096.554125][ T5895] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2096.561832][ T5895] #PF: supervisor read access in kernel mode [ 2096.567932][ T5895] #PF: error_code(0x0000) - not-present page [ 2096.573883][ T5895] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8fc9a067 PTE 0 [ 2096.581416][ T5895] Oops: 0000 [#21] PREEMPT SMP KASAN [ 2096.586848][ T5895] CPU: 1 PID: 5895 Comm: kworker/1:8 Not tainted 5.3.0-rc3+ #0 [ 2096.594542][ T5895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2096.604597][ T5895] Workqueue: events bpf_prog_free_deferred [ 2096.610392][ T5895] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 2096.616532][ T5895] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 2096.636119][ T5895] RSP: 0018:ffff88808adb96d8 EFLAGS: 00010806 [ 2096.642166][ T5895] RAX: 1ffffffff4006000 RBX: ffffffffa0030000 RCX: ffffffff817dc69f [ 2096.650128][ T5895] RDX: 0000000000000000 RSI: ffffffff817dc6a9 RDI: 0000000000000006 [ 2096.658079][ T5895] RBP: ffff88808adb9718 R08: ffff88808be14640 R09: 0000000000000000 [ 2096.666128][ T5895] R10: fffffbfff134b11f R11: ffff88808be14640 R12: ffff888098d06cb8 [ 2096.674081][ T5895] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888098d06cb8 [ 2096.682038][ T5895] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2096.690945][ T5895] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2096.697513][ T5895] CR2: fffffbfff4006000 CR3: 000000008cb0b000 CR4: 00000000001406e0 [ 2096.705470][ T5895] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2096.713421][ T5895] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2096.721371][ T5895] Call Trace: [ 2096.724659][ T5895] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2096.732350][ T5895] #PF: supervisor read access in kernel mode [ 2096.738300][ T5895] #PF: error_code(0x0000) - not-present page [ 2096.744261][ T5895] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8fc9a067 PTE 0 [ 2096.751791][ T5895] Oops: 0000 [#22] PREEMPT SMP KASAN [ 2096.757055][ T5895] CPU: 1 PID: 5895 Comm: kworker/1:8 Not tainted 5.3.0-rc3+ #0 [ 2096.764580][ T5895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2096.774621][ T5895] Workqueue: events bpf_prog_free_deferred [ 2096.780412][ T5895] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 2096.786635][ T5895] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 2096.806226][ T5895] RSP: 0018:ffff88808adb91f8 EFLAGS: 00010806 [ 2096.812444][ T5895] RAX: 1ffffffff4006000 RBX: ffffffffa0030000 RCX: ffffffff817dc69f [ 2096.820395][ T5895] RDX: 0000000000000000 RSI: ffffffff817dc6a9 RDI: 0000000000000006 [ 2096.828352][ T5895] RBP: ffff88808adb9238 R08: ffff88808be14640 R09: 0000000000000000 [ 2096.836303][ T5895] R10: fffffbfff134b11f R11: ffff88808be14640 R12: ffff888098d06cb8 [ 2096.844254][ T5895] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888098d06cb8 [ 2096.852316][ T5895] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2096.861221][ T5895] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2096.867780][ T5895] CR2: fffffbfff4006000 CR3: 000000008cb0b000 CR4: 00000000001406e0 [ 2096.875729][ T5895] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2096.883680][ T5895] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2096.891628][ T5895] Call Trace: [ 2096.894924][ T5895] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2096.902624][ T5895] #PF: supervisor read access in kernel mode [ 2096.908579][ T5895] #PF: error_code(0x0000) - not-present page [ 2096.914533][ T5895] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8fc9a067 PTE 0 [ 2096.922063][ T5895] Oops: 0000 [#23] PREEMPT SMP KASAN [ 2096.927326][ T5895] CPU: 1 PID: 5895 Comm: kworker/1:8 Not tainted 5.3.0-rc3+ #0 [ 2096.934842][ T5895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2096.944904][ T5895] Workqueue: events bpf_prog_free_deferred [ 2096.950702][ T5895] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 2096.956834][ T5895] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 2096.976417][ T5895] RSP: 0018:ffff88808adb8d18 EFLAGS: 00010806 [ 2096.982463][ T5895] RAX: 1ffffffff4006000 RBX: ffffffffa0030000 RCX: ffffffff817dc69f [ 2096.990413][ T5895] RDX: 0000000000000000 RSI: ffffffff817dc6a9 RDI: 0000000000000006 [ 2096.998362][ T5895] RBP: ffff88808adb8d58 R08: ffff88808be14640 R09: 0000000000000000 [ 2097.006328][ T5895] R10: fffffbfff134b11f R11: ffff88808be14640 R12: ffff888098d06cb8 [ 2097.014278][ T5895] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888098d06cb8 [ 2097.022230][ T5895] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2097.031134][ T5895] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2097.037694][ T5895] CR2: fffffbfff4006000 CR3: 000000008cb0b000 CR4: 00000000001406e0 [ 2097.045652][ T5895] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2097.053603][ T5895] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2097.061555][ T5895] Call Trace: [ 2097.064840][ T5895] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2097.072531][ T5895] #PF: supervisor read access in kernel mode [ 2097.078501][ T5895] #PF: error_code(0x0000) - not-present page [ 2097.084450][ T5895] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8fc9a067 PTE 0 [ 2097.092054][ T5895] Thread overran stack, or stack corrupted [ 2097.097839][ T5895] Oops: 0000 [#24] PREEMPT SMP KASAN [ 2097.103111][ T5895] CPU: 1 PID: 5895 Comm: kworker/1:8 Not tainted 5.3.0-rc3+ #0 [ 2097.110635][ T5895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2097.120688][ T5895] Workqueue: events bpf_prog_free_deferred [ 2097.126481][ T5895] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 2097.132620][ T5895] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 2097.152213][ T5895] RSP: 0018:ffff88808adb8838 EFLAGS: 00010806 [ 2097.158269][ T5895] RAX: 1ffffffff4006000 RBX: ffffffffa0030000 RCX: ffffffff817dc69f [ 2097.166490][ T5895] RDX: 0000000000000000 RSI: ffffffff817dc6a9 RDI: 0000000000000006 [ 2097.174528][ T5895] RBP: ffff88808adb8878 R08: ffff88808be14640 R09: 0000000000000000 [ 2097.182476][ T5895] R10: fffffbfff134b11f R11: ffff88808be14640 R12: ffff888098d06cb8 [ 2097.190430][ T5895] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888098d06cb8 [ 2097.198398][ T5895] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2097.207304][ T5895] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2097.213877][ T5895] CR2: fffffbfff4006000 CR3: 000000008cb0b000 CR4: 00000000001406e0 [ 2097.221849][ T5895] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2097.230333][ T5895] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2097.238284][ T5895] Call Trace: [ 2097.241573][ T5895] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2097.249264][ T5895] #PF: supervisor read access in kernel mode [ 2097.255217][ T5895] #PF: error_code(0x0000) - not-present page [ 2097.261185][ T5895] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8fc9a067 PTE 0 [ 2097.268717][ T5895] Thread overran stack, or stack corrupted [ 2097.274506][ T5895] Oops: 0000 [#25] PREEMPT SMP KASAN [ 2097.279775][ T5895] CPU: 1 PID: 5895 Comm: kworker/1:8 Not tainted 5.3.0-rc3+ #0 [ 2097.287468][ T5895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2097.297518][ T5895] Workqueue: events bpf_prog_free_deferred [ 2097.303307][ T5895] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 2097.309447][ T5895] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 2097.329043][ T5895] RSP: 0018:ffff88808adb8358 EFLAGS: 00010806 [ 2097.335093][ T5895] RAX: 1ffffffff4006000 RBX: ffffffffa0030000 RCX: ffffffff817dc69f [ 2097.343159][ T5895] RDX: 0000000000000000 RSI: ffffffff817dc6a9 RDI: 0000000000000006 [ 2097.351121][ T5895] RBP: ffff88808adb8398 R08: ffff88808be14640 R09: 0000000000000000 [ 2097.359086][ T5895] R10: fffffbfff134b11f R11: ffff88808be14640 R12: ffff888098d06cb8 [ 2097.367045][ T5895] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888098d06cb8 [ 2097.375010][ T5895] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2097.383919][ T5895] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2097.390492][ T5895] CR2: fffffbfff4006000 CR3: 000000008cb0b000 CR4: 00000000001406e0 [ 2097.398484][ T5895] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2097.406530][ T5895] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2097.414565][ T5895] Call Trace: [ 2097.417859][ T5895] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2097.425548][ T5895] #PF: supervisor read access in kernel mode [ 2097.431503][ T5895] #PF: error_code(0x0000) - not-present page [ 2097.437461][ T5895] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8fc9a067 PTE 0 [ 2097.444991][ T5895] Thread overran stack, or stack corrupted [ 2097.450774][ T5895] Oops: 0000 [#26] PREEMPT SMP KASAN [ 2097.456045][ T5895] CPU: 1 PID: 5895 Comm: kworker/1:8 Not tainted 5.3.0-rc3+ #0 [ 2097.463561][ T5895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2097.473785][ T5895] Workqueue: events bpf_prog_free_deferred [ 2097.479599][ T5895] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 2097.485742][ T5895] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 2097.505421][ T5895] RSP: 0018:ffff88808adb7e78 EFLAGS: 00010806 [ 2097.511468][ T5895] RAX: 1ffffffff4006000 RBX: ffffffffa0030000 RCX: ffffffff817dc69f [ 2097.519464][ T5895] RDX: 0000000000000000 RSI: ffffffff817dc6a9 RDI: 0000000000000006 [ 2097.527415][ T5895] RBP: ffff88808adb7eb8 R08: ffff88808be14640 R09: 0000000000000000 [ 2097.535364][ T5895] R10: fffffbfff134b11f R11: ffff88808be14640 R12: ffff888098d06cb8 [ 2097.543326][ T5895] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888098d06cb8 [ 2097.551366][ T5895] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2097.560279][ T5895] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2097.566840][ T5895] CR2: fffffbfff4006000 CR3: 000000008cb0b000 CR4: 00000000001406e0 [ 2097.574795][ T5895] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2097.582751][ T5895] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2097.590697][ T5895] Call Trace: [ 2097.593973][ T5895] ? __die+0x6c/0xb6 [ 2097.597856][ T5895] ? no_context+0x3e3/0x990 [ 2097.602342][ T5895] ? __kasan_check_read+0x11/0x20 [ 2097.607353][ T5895] ? pgtable_bad+0x90/0x90 [ 2097.611752][ T5895] ? console_unlock+0x6bb/0xf10 [ 2097.616579][ T5895] ? __kasan_check_read+0x11/0x20 [ 2097.621582][ T5895] ? __kasan_check_write+0x14/0x20 [ 2097.626672][ T5895] ? __bad_area_nosemaphore+0xae/0x420 [ 2097.632114][ T5895] ? console_unlock+0x6a1/0xf10 [ 2097.636956][ T5895] ? bad_area_nosemaphore+0x2e/0x40 [ 2097.642135][ T5895] ? __do_page_fault+0x7fa/0xdd0 [ 2097.647053][ T5895] ? page_fault+0x16/0x40 [ 2097.651360][ T5895] ? trace_hardirqs_off_caller+0x65/0x230 [ 2097.657066][ T5895] ? do_page_fault+0x38/0x590 [ 2097.661724][ T5895] ? page_fault+0x39/0x40 [ 2097.666157][ T5895] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2097.673852][ T5895] #PF: supervisor read access in kernel mode [ 2097.679803][ T5895] #PF: error_code(0x0000) - not-present page [ 2097.685761][ T5895] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8fc9a067 PTE 0 [ 2097.693290][ T5895] Thread overran stack, or stack corrupted [ 2097.699077][ T5895] Oops: 0000 [#27] PREEMPT SMP KASAN [ 2097.704351][ T5895] CPU: 1 PID: 5895 Comm: kworker/1:8 Not tainted 5.3.0-rc3+ #0 [ 2097.711868][ T5895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2097.721913][ T5895] Workqueue: events bpf_prog_free_deferred [ 2097.727708][ T5895] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 2097.733950][ T5895] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 2097.753618][ T5895] RSP: 0018:ffff88808adb7998 EFLAGS: 00010806 [ 2097.759665][ T5895] RAX: 1ffffffff4006000 RBX: ffffffffa0030000 RCX: ffffffff817dc69f [ 2097.767887][ T5895] RDX: 0000000000000000 RSI: ffffffff817dc6a9 RDI: 0000000000000006 [ 2097.775844][ T5895] RBP: ffff88808adb79d8 R08: ffff88808be14640 R09: 0000000000000000 [ 2097.783801][ T5895] R10: fffffbfff134b11f R11: ffff88808be14640 R12: ffff888098d06cb8 [ 2097.791753][ T5895] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888098d06cb8 [ 2097.799705][ T5895] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2097.808613][ T5895] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2097.815175][ T5895] CR2: fffffbfff4006000 CR3: 000000008cb0b000 CR4: 00000000001406e0 [ 2097.823126][ T5895] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2097.831077][ T5895] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2097.839025][ T5895] Call Trace: [ 2097.842315][ T5895] ? __die+0x6c/0xb6 [ 2097.846202][ T5895] ? no_context+0x3e3/0x990 [ 2097.850685][ T5895] ? __kasan_check_read+0x11/0x20 [ 2097.855691][ T5895] ? pgtable_bad+0x90/0x90 [ 2097.860091][ T5895] ? console_unlock+0x6bb/0xf10 [ 2097.864931][ T5895] ? __kasan_check_read+0x11/0x20 [ 2097.869942][ T5895] ? __kasan_check_write+0x14/0x20 [ 2097.875136][ T5895] ? __bad_area_nosemaphore+0xae/0x420 [ 2097.880573][ T5895] ? console_unlock+0x6a1/0xf10 [ 2097.885417][ T5895] ? bad_area_nosemaphore+0x2e/0x40 [ 2097.890595][ T5895] ? __do_page_fault+0x7fa/0xdd0 [ 2097.895519][ T5895] ? page_fault+0x16/0x40 [ 2097.899832][ T5895] ? trace_hardirqs_off_caller+0x65/0x230 [ 2097.905542][ T5895] ? do_page_fault+0x38/0x590 [ 2097.910197][ T5895] ? page_fault+0x39/0x40 [ 2097.914528][ T5895] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2097.922218][ T5895] #PF: supervisor read access in kernel mode [ 2097.928172][ T5895] #PF: error_code(0x0000) - not-present page [ 2097.934123][ T5895] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8fc9a067 PTE 0 [ 2097.941655][ T5895] Thread overran stack, or stack corrupted [ 2097.947537][ T5895] Oops: 0000 [#28] PREEMPT SMP KASAN [ 2097.952799][ T5895] CPU: 1 PID: 5895 Comm: kworker/1:8 Not tainted 5.3.0-rc3+ #0 [ 2097.960413][ T5895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2097.970553][ T5895] Workqueue: events bpf_prog_free_deferred [ 2097.976349][ T5895] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 2097.982487][ T5895] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 2098.002072][ T5895] RSP: 0018:ffff88808adb74b8 EFLAGS: 00010806 [ 2098.008116][ T5895] RAX: 1ffffffff4006000 RBX: ffffffffa0030000 RCX: ffffffff817dc69f [ 2098.016067][ T5895] RDX: 0000000000000000 RSI: ffffffff817dc6a9 RDI: 0000000000000006 [ 2098.024017][ T5895] RBP: ffff88808adb74f8 R08: ffff88808be14640 R09: 0000000000000000 [ 2098.031975][ T5895] R10: fffffbfff134b11f R11: ffff88808be14640 R12: ffff888098d06cb8 [ 2098.039934][ T5895] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888098d06cb8 [ 2098.047894][ T5895] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2098.056798][ T5895] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2098.063364][ T5895] CR2: fffffbfff4006000 CR3: 000000008cb0b000 CR4: 00000000001406e0 [ 2098.071318][ T5895] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2098.079270][ T5895] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2098.087217][ T5895] Call Trace: [ 2098.090505][ T5895] ? __die+0x6c/0xb6 [ 2098.094383][ T5895] ? no_context+0x3e3/0x990 [ 2098.098863][ T5895] ? __kasan_check_read+0x11/0x20 [ 2098.103870][ T5895] ? pgtable_bad+0x90/0x90 [ 2098.108882][ T5895] ? console_unlock+0x6bb/0xf10 [ 2098.113720][ T5895] ? __kasan_check_read+0x11/0x20 [ 2098.118734][ T5895] ? __kasan_check_write+0x14/0x20 [ 2098.123840][ T5895] ? __bad_area_nosemaphore+0xae/0x420 [ 2098.129277][ T5895] ? console_unlock+0x6a1/0xf10 [ 2098.134111][ T5895] ? bad_area_nosemaphore+0x2e/0x40 [ 2098.139294][ T5895] ? __do_page_fault+0x7fa/0xdd0 [ 2098.144228][ T5895] ? page_fault+0x16/0x40 [ 2098.148540][ T5895] ? trace_hardirqs_off_caller+0x65/0x230 [ 2098.154240][ T5895] ? do_page_fault+0x38/0x590 [ 2098.158899][ T5895] ? page_fault+0x39/0x40 [ 2098.163220][ T5895] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2098.170909][ T5895] #PF: supervisor read access in kernel mode [ 2098.176867][ T5895] #PF: error_code(0x0000) - not-present page [ 2098.182824][ T5895] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8fc9a067 PTE 0 [ 2098.190347][ T5895] Thread overran stack, or stack corrupted [ 2098.196131][ T5895] Oops: 0000 [#29] PREEMPT SMP KASAN [ 2098.201573][ T5895] CPU: 1 PID: 5895 Comm: kworker/1:8 Not tainted 5.3.0-rc3+ #0 [ 2098.209088][ T5895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2098.219142][ T5895] Workqueue: events bpf_prog_free_deferred [ 2098.224933][ T5895] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 2098.231067][ T5895] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 2098.250649][ T5895] RSP: 0018:ffff88808adb6fd8 EFLAGS: 00010806 [ 2098.256703][ T5895] RAX: 1ffffffff4006000 RBX: ffffffffa0030000 RCX: ffffffff817dc69f [ 2098.264655][ T5895] RDX: 0000000000000000 RSI: ffffffff817dc6a9 RDI: 0000000000000006 [ 2098.272608][ T5895] RBP: ffff88808adb7018 R08: ffff88808be14640 R09: 0000000000000000 [ 2098.280647][ T5895] R10: fffffbfff134b11f R11: ffff88808be14640 R12: ffff888098d06cb8 [ 2098.288605][ T5895] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888098d06cb8 [ 2098.296727][ T5895] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2098.305662][ T5895] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2098.312238][ T5895] CR2: fffffbfff4006000 CR3: 000000008cb0b000 CR4: 00000000001406e0 [ 2098.320204][ T5895] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2098.328159][ T5895] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2098.336202][ T5895] Call Trace: [ 2098.339561][ T5895] Modules linked in: [ 2098.343445][ T5895] CR2: fffffbfff4006000 [ 2098.347585][ T5895] ---[ end trace 70ba4bd07a73be71 ]--- [ 2098.353037][ T5895] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 2098.359173][ T5895] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 2098.379449][ T5895] RSP: 0018:ffff88808adbf850 EFLAGS: 00010806 [ 2098.385597][ T5895] RAX: 1ffffffff4006000 RBX: ffffffffa0030000 RCX: ffffffff817dc69f [ 2098.393546][ T5895] RDX: 0000000000000000 RSI: ffffffff817dc6a9 RDI: 0000000000000006 [ 2098.401514][ T5895] RBP: ffff88808adbf890 R08: ffff88808be14640 R09: ffffed1015d26cb4 [ 2098.409463][ T5895] R10: ffffed1015d26cb3 R11: ffff8880ae93659b R12: ffff888098d06cb8 [ 2098.417426][ T5895] R13: dffffc0000000000 R14: ffffffffffffffff R15: ffff888098d06cb8 [ 2098.425380][ T5895] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2098.434287][ T5895] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2098.440854][ T5895] CR2: fffffbfff4006000 CR3: 000000008cb0b000 CR4: 00000000001406e0 [ 2098.448837][ T5895] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2098.456808][ T5895] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2098.464765][ T5895] Kernel panic - not syncing: Fatal exception [ 2098.472446][ T5895] Kernel Offset: disabled [ 2098.476873][ T5895] Rebooting in 86400 seconds..